2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, 0x0, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) 16:54:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) 16:54:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240), 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) 16:54:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 3: syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240), 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) 16:54:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 16:54:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240), 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:18 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 16:54:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:19 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:19 executing program 4: write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x35, &(0x7f000002eff0)={0x0, 0x0}, 0x10) 16:54:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 16:54:19 executing program 4: 16:54:19 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:19 executing program 5: 16:54:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) 16:54:19 executing program 4: 16:54:19 executing program 5: 16:54:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:19 executing program 1: 16:54:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) 16:54:19 executing program 4: 16:54:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:20 executing program 5: 16:54:20 executing program 1: 16:54:20 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 16:54:20 executing program 4: 16:54:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) 16:54:20 executing program 5: 16:54:20 executing program 1: 16:54:20 executing program 5: 16:54:20 executing program 4: 16:54:20 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1}, 0x20) 16:54:20 executing program 1: 16:54:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 16:54:20 executing program 5: 16:54:20 executing program 4: 16:54:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1}, 0x20) 16:54:20 executing program 3: socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:20 executing program 1: 16:54:20 executing program 5: 16:54:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1}, 0x20) 16:54:21 executing program 4: 16:54:21 executing program 1: 16:54:21 executing program 5: 16:54:21 executing program 3: socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 16:54:21 executing program 4: 16:54:21 executing program 5: 16:54:21 executing program 1: 16:54:21 executing program 3: socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:21 executing program 2: 16:54:21 executing program 4: 16:54:21 executing program 5: 16:54:21 executing program 1: 16:54:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 16:54:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:21 executing program 2: 16:54:21 executing program 4: 16:54:21 executing program 1: 16:54:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 16:54:21 executing program 5: 16:54:22 executing program 4: 16:54:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:22 executing program 2: 16:54:22 executing program 1: 16:54:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 16:54:22 executing program 5: 16:54:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x803, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0xffffff44, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b000c0f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) 16:54:22 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad79c7e8683ac61d859a63668db03b6806e1b26df4787c75fc0388de8c24377fd0d27caaedc7fe84aa5720e631ec2d22f2e89e6ca403bc571aa6039de4795e200f35134cf25758a8b7542ea6c3c37c4ebddc0e1f658765e4dce904fcb1cbaa5e0f946a89856208a8019f2a1b814f82d7baaac880e70040bbdc8c7b899f9aabf63655d2ef56c542588c3357943df7566f3fadf8ce1ae2503c68d4898b4f94ba64723a5fc73d616bcf5f1d17a9675b7cf52267a098c818fcc965a1caf6c2894fbffde", @ANYBLOB="27fb1299e4fd3329137c495a519f5cbbc5b9c6fab5f3020449d80a91f54bbeae0ac0df19e4e33ec4a3a933a7f8cf9d024714db9fc0ba87957bcd818a047fd5372ba53a6467"], 0x0, 0x135}, 0x20) tkill(r0, 0x3b) clone(0x0, &(0x7f0000000140)="328f40d8", 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:54:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000002500)=[{&(0x7f0000000000)=""/85, 0x55}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffdbe, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x23, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x18309141a47aa1d6, 0x2, 0x0, 0x800e0051f) shutdown(r2, 0x0) 16:54:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:22 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x103, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) r0 = syz_open_dev$adsp(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x3, 0x6) ioctl$int_in(r1, 0x800000c004500a, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0xffffffffffffff1b, 0x12, 0x100000000000700, {0x8, 0x0, 0x0, 0x0, 0x803e0000}}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 16:54:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) [ 650.055825][T24012] ptrace attach of "/root/syz-executor.2"[24011] was attempted by "/root/syz-executor.2"[24012] 16:54:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x29) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r2 = open(0x0, 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xffff) ftruncate(r2, 0x2007fff) sendfile(0xffffffffffffffff, r2, 0x0, 0x8482) write$P9_RMKDIR(r2, 0x0, 0x0) pipe(&(0x7f0000000200)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(0x0) sched_setattr(0x0, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000180)={0x8, 0x20, 0x76}) fchdir(0xffffffffffffffff) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x8000fffffffe) sendfile(r3, r4, 0x0, 0xa5cc554) bind$bt_sco(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, {0x6, 0x9, 0x7, 0x2e, 0xa5}}, 0x8) 16:54:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) [ 650.293054][ T26] audit: type=1804 audit(1575132862.681:51923): pid=24034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir961499507/syzkaller.LFuk4j/643/bus" dev="sda1" ino=16886 res=1 16:54:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240), 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80), 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, 0x0, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:23 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80), 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) [ 651.091178][ T26] audit: type=1804 audit(1575132863.481:51924): pid=24079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir961499507/syzkaller.LFuk4j/643/bus" dev="sda1" ino=16886 res=1 16:54:23 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:23 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) [ 651.220860][ T26] audit: type=1804 audit(1575132863.491:51925): pid=24034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir961499507/syzkaller.LFuk4j/643/bus" dev="sda1" ino=16886 res=1 16:54:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) 16:54:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) 16:54:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80), 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, 0x0}, 0x0) 16:54:23 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80), 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) 16:54:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102}, 0x20) 16:54:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, 0x0}, 0x0) 16:54:24 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, 0x0}, 0x0) 16:54:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) 16:54:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, 0x0}, 0x0) 16:54:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') 16:54:24 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') 16:54:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) 16:54:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, 0x0}, 0x0) 16:54:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x0, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:54:25 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) 16:54:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') 16:54:25 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) 16:54:26 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) 16:54:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) 16:54:26 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) 16:54:26 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) 16:54:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') 16:54:26 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 16:54:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) r4 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r4, 0x0) 16:54:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:26 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f00000005c0)=""/223, 0xfc61) 16:54:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 1: syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:27 executing program 3: syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:27 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 16:54:28 executing program 5: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 16:54:28 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) r3 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r3, 0x0) 16:54:28 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 16:54:28 executing program 4: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 16:54:28 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 0: syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 5: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 16:54:28 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 4: syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 16:54:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 16:54:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) mq_notify(0xffffffffffffffff, 0x0) 16:54:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @dev}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:29 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) mq_notify(0xffffffffffffffff, 0x0) 16:54:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:30 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:30 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:30 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:30 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={0x0}}, 0x0) 16:54:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 16:54:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) 16:54:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) 16:54:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) 16:54:31 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x1}, {0xf}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm_plock\x00', 0x10a000, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) 16:54:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:31 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:31 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:31 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:31 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:31 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:32 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f00000000c0), 0xe) listen(r0, 0x0) accept(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 16:54:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 16:54:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b}, 0x20}}, 0x0) 16:54:33 executing program 4: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x4788}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc, 0x80, 0x0}}], 0x2, 0x0) 16:54:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 16:54:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 16:54:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 16:54:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 16:54:33 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="232120090fb89188738c1e1c212020"], 0xf) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) r1 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x4788}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) 16:54:33 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="232120090fb89188738c1e1c212020"], 0xf) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) r1 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x4788}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7a, &(0x7f0000000200)={r6, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r6, 0x7, 0x2441, 0x1671, 0x7, 0x95c}, 0x14) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) 16:54:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000002a40)='cgroup.threads\x00', 0x2, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000000240)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)=[{&(0x7f0000000440)={0x2398, 0x28, 0x800, 0x70bd2c, 0x25dfdbfb, "", [@nested={0x20, 0x60, [@typed={0x8, 0x8b, @pid=r4}, @generic="a77931cb463386ce1fb8fc8dee997a6e145196"]}, @nested={0x10dc, 0x80, [@generic="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", @generic="54b70eb0ca68cb14cf9363f8b446f0e7032fb8f5295a7efcc7fefea822631e77bddbbda11c8edf5de01e046bdb42ae03e826a519eb3098b0b215a41082e5e805629d0a7bfc7f7010714218d9a0775c79d16c5eb76d8bb0bf2f6749e7739573db554545f09df6aff807fed519c50237c71068be15ce3ec64054e0f7087a6dd9bf99f0ae2c8e898ed91098f15c5566e36b16dec2a7bbac5f623864606be79f6b34c8bcc4a96c7e29ebb87e06d07115862a83c1d9c7d0ac960c074e5adf5b736bae2c3faf106d428a841003", @typed={0xc, 0x93, @u64=0x7f}]}, @nested={0x10a0, 0x18, [@typed={0x8, 0x65, @u32=0x401}, @typed={0x8, 0x89, @fd=r5}, @generic="1e4f26a1274ca406baccb7846ce434d256cd6ee0564f581e3842e81e27f1e93706f742267363032f11752e73f58c30659800c65e60796aa433556084be8789bc8753c62d227174a087389ae8f25b76ee6b5996c9e6821a259232c579b2ba5b983e662668600d4279870dddb5561b86493c0e0137dc401861ac0acb5d040c4cb3fd6a068d72ef896c6588d64213df7620f7c1d9a8b3d8072d2f36a87b0d46b3c605ba589d049f043c21e8d7f128653b0befc7fd10520eae6131e360ce9c2fd6ce74537fad99100e9a4a2b093b0100abc2bdd1fb4287e4e11a4ecbb186e196bdbaca17f7b7a9c679373ac0de91bce0bdfc5db7eff963e171df4777a7557380b63d7c86e5903a5859b16f3274d0829445ae45f02e5237b4e1f0e65870a6ef1ce128cb0d439a1521045740c7dec3036332918faf6344f76c1ac966b4c58ff72ecae2430bbb4614596960075c0a969891311c5001209828fe97922f3d5daea7d0c44143226746944f4d2ff52595be2ef9ab429b6e1e1c92ba8b3e40850c85d7ba39fd0617cba2546a207542ca0e373847ba4f9b24101f79a387391f7a2de7c5f8c87c8294cc55a53249189e714e821c85a22c987119100a8f4fc36c8831be64bdd91761340cedae49bea76930b879949f679edfdd12957cd8d64fef2a2211b56fd96a5cae7f28d11073bb2be6bd0edc477929d0a9d99f725526dc6f9f204a795c4bf2c4197c9866e20b5d97c57e77c68806e0c03d60ad61e7ee65b8be8d532bf600f4db84a03ec0793e6501e99c4d2875d38bebefc48c017bb1540b9cf9ac38e134ee2512aafc6be9a741b4d04dea19bf7aef81334325385056175ef9effdc9e70e506b76a247e5cc04515ee7c1c992dba31a0eb203be95ed6d8671dd43bcb01730b239dd94927f95ea9db36ff902110820d2fdcd762c1cbe0e54cba24eccbec20342a362513291ed430f72b9621f423ce733d5185eb3d7bf58db4a64eb013d771de192bfda791d4d09d7d1493d88daea071625636ce82ec6ab6ab1348dbc86e0526509e66b858506443bd7c56d36f12c8fd02c36563301d93ea3f1d362ca548f0e7ee42947de3e779147c4479049b0b4673bb9c22acfa615433c40f8931ba79c577b3440ebfabd6f813890c1f98f54d6b9bdc5d7c72723a2938d30b2707de3e62f9ea3e3a76d537bb2ec15e92eb68df6dd91a5140b0eddddc8eeb95b26c16acffcf67666c47e7e9101c649d2c972920f96544199c8dafcc6bdeaaace8db0e573046e28514c18df9a44ae4e50a04620e2a9c0619d228bff995e505179fef130dbea63deb8148b86861f16b0d538e75ef0de5343c4fa7930287f734cd0670af0077d2b563d5ff30225ef4e01e0221afae8bab84fb1db6c34a98b495ddece144213e80e2df106c0534e3bed34bf6cc503412fee891905e4290c3f63b604ad322eb9a81265f88bfb664af1dc1540567e4ff6bba7f0fd39526e8e3afdcff505f5078accc970c6b0d81864bcad6df87227ba0f3b365847d667d294bf7163b3d3affe2d41166b45009938965dbe74eec14cc55c0f00487c8219c27957228b3634a712d9e8a2ab22ac72f0e93a60b337d3ec4970afbd34d61425656cf7ba84d626f568930371d8e1d789533b2bbed3461bb626b9ffef5eecde4e9390ee504b48fdd92855d0ced20c998d75a6db13219f6318b0abcb6b9622de4cdbdc9e7d0fa0d302ce6c4049cae60be045347ade5b0e99fae693218bdd5afbf4e070ab612b449cd2322b9af496e4435b021f473fb856e0df1c62e6e6dba41e227e62a2078f838c2b870684d350db4b97d26d1cb21d1924f06f16ed7e2bc3ac62bbbf263c40004193f66dd84e66ca77579f77650c460d7ddfe00fa0f12ddcaede9fc3ce6de2fab4f9070c75441dc3cc5b6d17cf9636d0e9c4dc8efe6e4cc278017276394e92d6b815dcd4dbf3298f5bc19153c01b691c7fe45c7a14a265d6f1538734267b5947527b89a0ece4fe20d0d194e7a5887b7e657acc2150c8499f09fb2be6c85c7144c4ff9c5658a2d3055931c9467c033a79fe8bcf06e776e3de1a776a3e95956f4860cee7ada241d25aa05ddedda3e750d912661164c081e393c008a6031f24ace8be7f6deb024add2a72da8f251ffab2cc8bbdb4dbebfc91b87043f5616f99b8b74711ba07c6c49fef30a4a89e7853dcc86bea1b655ac7974b547cbf51e06882852414f7ec4144bb8ab7af87ab0d271c631a3c7cb02527ff4237ac002bc1c2ea1421c0f3c91dcee3339c022ddbb1032d4ec0b83a37faff5d22a8f668ad7b869be403187e84a06366d7bedf4c64524f8fe855080c987bcbf162e2ca50cb5190106f11876e2844846815af0ab743e19373cb6e0d8bc5d7452bd487a3655358083b4e2d64a80e37bc0e4939419188a53c4a32908a5cab56a11f551f1cab206908396e201164b8a992988f500a60a59f49cd4334aa3f976ad618e67f06c9d59728be76cf7bf914d69962bb1c1443d2c2f26bc89ee4396ddb6036bb78066b7e756a42b0a5b41285aabe092b46e5ead07491381ccff7bc85735ce77e3c0c81461b88f3b0cb39565baf24aea32b9ab139303b761c7f0aa819781f9eb67f971f330c386cb9354c6717a5bc0c439d3acb486a7a19caf43e23daaff97201551b64d0e24187b97947bfbe0a4adaa9ba7a638460989fbfd5722f6c03cb27133a7a9e73a0934fd17c4b75e4e6e29669b98141b5d8989d8e4ff2960e19716017f34ece86b1c38d28c576190009f408f82ff5ba35ea8fd925130af2a67c847f864bacb8cbd7371303486d5e379f7f317b17b0706c3cd324b9527c8b795b0e698ae2d73f8620f89020bebe4b2b7b68f6e9b814ee6f5d13a624f19b9c4add20396bb647fa0b2f34372fc73b3b9210ae6690ed424de781afe3413b75baf9fb8d9d23a2b0237f65e3d999eab6a45ec746b788db1ae9242e6c610617dc9e17dc92b76fabd29dd05edc24359bedf6ab63564911910ebd3e2ebf05f876ea28531436757c86929b3be1233160dcae46e99f4fe8a3a5feb9dd23bf0af2a394ad1986a2962f2679cc44ede21ec4d4cd5f71b0be56dec2c225ab9abdf66a0df9fc9b0ce624ce15baac0378c2acbf4e43bbb4dcfda4fd1921297f8ade124de1ffad14ff6717b1ee98a336bb8574dc3e918e9309e35b3d6697110a1a6620680b5405da0391e21345677cc1fd4c433641c0a4cffdc32318949a1b201994c4ff2d49832370a73d7e8d1d6846789962d48999a9d407eb6972ad48cf9f487a66c8b924e79133300486ad9963b7f0bb1e03529f2e638c941dee2e0255c2c933270e43294e0f35e02c378ea5ef814cede2318110f175b13f4ed483eea560c3c9a4c31ad55bd10c9a12c218fc8c33a9706fabac8870d3121d61bb6170630fcc1a3f01589834b94686cd25af2645d4651770d52cfaef5d3e3546c1c9d8b3fc8064ff9ecf7ce7d8904f74d575e1f532e407762cb67511a157182ac208e103177d918da1fe721d6bad4ffefa187df10cc111988b95a0beb85fda10d12b521c03ce5b44494e6dfd925e30f695b7040ab19e6a379db48138ecbc99fa9b95871d545a9ada9228d7cfbe405eda17676221cce4a7bc8976474a8d17799f6d74485252d651bf75de7b3f25598672b51e6514a7d75c7daf35185b871064ab1b361d069f8a14757080de198971f51e00c66d8976bb5a53e5cd8e54c9782ccae44b7c144d95f312d4cc1e5bce95eaab041b7efad494faf96cff55676b7f722a000465e40ee38cb2aa2066826b61b041046c84f0c9f3a6b329b7fdf7fcfffd0ea93f994b7440c71d87b1cb12ccf0f6a5f19467a812d9a4999b8bc5274a2ed96006e3332024f1e9ffec16dfc925d8cd94b155a31ce43aaef26950445bbdba96f2a3f8d15b15cbcb033c2043b9455bf509374bf79609e6ed1f1817aedfae50b50eb858ddb0a56f95d44597b11c45d3e1680f56418a9616075a29d6e48babbbe55bf33891e2ababf6f59d89245b4af42f2a8e05177e0ed84b2dfe076d0e4908b4c3d84c2f702e0df8c489033bf25f18f278f083b3df03ebcd4bb63125ae164c950eb39be28ea30a7f5a802f50b1c471b5ab5702b3c38de7f7c79b6d76f362baff5c584ceb1e434ffbc2b390e6e69b9b83f8d799671cd4ca0190044a4fca0e007e9f6f07c147b9fc1ab5f752050c2cdc2c349d4e2f1b976123f89f97a341c30b3eca29e039c76cdb7d68b370e69633e5409b79027066c9946194ab7586b2dc433a88f622b9b3e9ff79b04a0284fda24388bba1ca3ea6c02d3ba030360fa0f87aa1b7d30ffff4176ee58bee95fe866ffec58a849a4d1095ace5c18bbba853745efda470f059580728a4a8589bf44f39fbbadf73712a9da3bc44828b3e48ddbb24050156e1221a4d691c957c6c04ff6d79ff4a7bdd57e10e994596790a3c28aff9128e0d77a007399dc660748e00e3ee7527ac7515bcaf724bc708d0c779dec93e10231f9f54069adea66da516ad9c4ce82cb47bbd6092f69fccaaf8cbec6df7ff479f2ff59f06a7e93f7110e263d83b031f7f65dd903802144f008286a7cf8559a7118019637cb08b73f8c5bdf371d6adb642e6a7db0e5c67d4ea6709d85216a61040a0dee67e4a56460cb512f7f2138d843ef47b1282a690b3a36747f980fda05232fa3b16b3e7884bc352fb49dc90ee20934b3bb811cdbc078016b4bd49b4495fcb6eb8ba72027facd1d86a85ce2b41f2aff9130d3e93b61a0df89cf7b10acfed5ed845cc3f696ec080a2cef88d38b12e3c4d4d772c003a8935ac2a4bb3502288b7a2598efc50a36e8a2d2b2781fb916122e44f02371e40f7f037581aac9fd4d11be407f7675b69416592f423c4d2f9689f28361e63dee50ca4741325f6a500ac0501ab2e8fa0ee6456ad33be4b85ea783822e2d4a2f27534f6a335907a25d012d21b476b3442816ed02fd3376c403a04fe1334ddf063a8520f653bb0552cd60a0e8fd1c51e5d572a887a4ef073ed9a9fe7da07fbbb484be64b5604dc05f3922cf345b6c2cc7fc145aaf56d54265d29d5ef802a56ad150b81ea5af53c0ce7cfb84973840224ed4b24bbf0fd4bf12ef5e5d8cede1e8406631457475e1d611165c9e9d1b2c7f63d0c6665107c9a99f4938a8f2816eb8d6da50ff0b7b16ff008d968014b4c428f9ae5c578cbaab1bab115ad0c51f06923a93665f946d57e9bdff936d1133ea7095fc2e8508b2ba853a759b3458d0fa59b249febcca3dad2dfe8d8fabe804a516bcdfb7a88107812926fa44b28e3598d3c28e584dd61ea5c6e44987985afc3e90e40b9d6a884a4197fef4c7d88e8d7f6de7f098a3e97a9b101aa515d239e683a78cf0a15f82513d7fc3d588b86ccf064bcbd2a01225367bbe773353acedd790ea2a488bdf62ebadd1809121291d1d6eec5e0cec1c7309d3dd97f043a5508e4a60738880346a84e6713ba9e129ef04f925f8cc2358cc4c95062973e3685b6b55d69db4d6fc96a3e5130ee95a4be64e3356d86f1b0cead09fd973a46c585cb3ec9d216b86862ec018e00de286cb33c035e0f4ba166dc2c88f4660310e11cc50c626ba256083d64cba3aadcd2a82fe5207c3bbf7acfe0ed83dcb32295b78b8a5a4f0f09e4208d9b9b680a901714470cf87652a5563127b35b2c62b5f85bed817155dee09770b109886b57ffa6ba5ed4b1fa084e38a90d019e50b954c168628fe03f5147c06e1d33bb6d84fa12f1865abccb185ddbaf890b4a097dfde95e8d31fa7f04aa2280af5612b241d2eb6d5cb0b21c0118d97e602cbe3402e91be5", @typed={0x8, 0x7, @str='GPL\x00'}, @generic="034d89e6d50aaf8b98688258a393eac5ada170b66defb6b64ab0dab43c3efc3626108db270a6b4c198c6ce464444c31a89ea7527b0b52fcc9ca53c01305ac10f3546af21ecdedd97a2c357280e75cf9771e0373f284b5a6f5d57da7779225be9e8affbe39069cfb6ad4f9c812cb410a6bc7ae2ac17ba4826dfdf5d871dd146ac25e0a2"]}, @nested={0x1cc, 0x1b, [@typed={0x8, 0x2, @str='GPL\x00'}, @typed={0xc, 0x15, @u64=0x9}, @generic="b68787234b513577cd9c7cbb59ca37883538a9f1f8120706f571347b64f1328d11f7059a565cf5d072d1ac289814d864c0021edd7921481241e6be37a8ea2f00e199b280f7da4b701d1f9ac05dbbee820204463e244f66a4cd05cf1a8a3ad18d369b4c6ab3d072a7a2b5c45ea415c583bd7c5a55e0ec764b7991d5722b19b8d99e17969caf733705038a9c55152e71b8", @typed={0x14, 0x46, @ipv6=@rand_addr="9084f193cd4379dbb05efb653e2a5629"}, @typed={0x8, 0x17, @str='GPL\x00'}, @typed={0x8, 0x81, @fd=r1}, @generic="926e9f64584c6bb73e80178dedb21b4ab464205d181a9eabf8f48de95b1f57180c32f01f6c48fe741d7bc1d9cd0b6a9951ab5663f35ed3b29e48fc84c6cb1aed597fcab8415637551c83f5812b32ff1efa655dee19b77bd39a1875b8155c138e", @generic="4fc043854911c029ac5f102a6e713ddd6b47fecdef45ff181c2e8192717c3693b23c9c183f5ae10969050a809d94a945cf19a20e9564fc83a155ff92e5b7c833ae4521614ba8efc1f108d164c5c1f8025e81ddbc80c44e8f0885d752ca4a037d7411d91d4d9a6830b0cad86e9be093b5b5a79d6deeacd2e485b4ae48693c038597cb9533df23e22e354cf8ef346249ef", @typed={0x10, 0x84, @str='cgroup\xa6$\x00'}]}, @typed={0x14, 0x25, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0xc, 0x19, @u64=0x8}]}, 0x2398}], 0x1}, 0xc0010) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 16:54:33 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="232120090fb89188738c1e1c212020"], 0xf) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) r1 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x4788}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7a, &(0x7f0000000200)={r6, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r6, 0x7, 0x2441, 0x1671, 0x7, 0x95c}, 0x14) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:54:33 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) inotify_rm_watch(r0, 0x0) 16:54:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000002a40)='cgroup.threads\x00', 0x2, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000000240)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)=[{&(0x7f0000000440)={0x2398, 0x28, 0x800, 0x70bd2c, 0x25dfdbfb, "", [@nested={0x20, 0x60, [@typed={0x8, 0x8b, @pid=r4}, @generic="a77931cb463386ce1fb8fc8dee997a6e145196"]}, @nested={0x10dc, 0x80, [@generic="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", @generic="54b70eb0ca68cb14cf9363f8b446f0e7032fb8f5295a7efcc7fefea822631e77bddbbda11c8edf5de01e046bdb42ae03e826a519eb3098b0b215a41082e5e805629d0a7bfc7f7010714218d9a0775c79d16c5eb76d8bb0bf2f6749e7739573db554545f09df6aff807fed519c50237c71068be15ce3ec64054e0f7087a6dd9bf99f0ae2c8e898ed91098f15c5566e36b16dec2a7bbac5f623864606be79f6b34c8bcc4a96c7e29ebb87e06d07115862a83c1d9c7d0ac960c074e5adf5b736bae2c3faf106d428a841003", @typed={0xc, 0x93, @u64=0x7f}]}, @nested={0x10a0, 0x18, [@typed={0x8, 0x65, @u32=0x401}, @typed={0x8, 0x89, @fd=r5}, @generic="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", @typed={0x8, 0x7, @str='GPL\x00'}, @generic="034d89e6d50aaf8b98688258a393eac5ada170b66defb6b64ab0dab43c3efc3626108db270a6b4c198c6ce464444c31a89ea7527b0b52fcc9ca53c01305ac10f3546af21ecdedd97a2c357280e75cf9771e0373f284b5a6f5d57da7779225be9e8affbe39069cfb6ad4f9c812cb410a6bc7ae2ac17ba4826dfdf5d871dd146ac25e0a2"]}, @nested={0x1cc, 0x1b, [@typed={0x8, 0x2, @str='GPL\x00'}, @typed={0xc, 0x15, @u64=0x9}, @generic="b68787234b513577cd9c7cbb59ca37883538a9f1f8120706f571347b64f1328d11f7059a565cf5d072d1ac289814d864c0021edd7921481241e6be37a8ea2f00e199b280f7da4b701d1f9ac05dbbee820204463e244f66a4cd05cf1a8a3ad18d369b4c6ab3d072a7a2b5c45ea415c583bd7c5a55e0ec764b7991d5722b19b8d99e17969caf733705038a9c55152e71b8", @typed={0x14, 0x46, @ipv6=@rand_addr="9084f193cd4379dbb05efb653e2a5629"}, @typed={0x8, 0x17, @str='GPL\x00'}, @typed={0x8, 0x81, @fd=r1}, @generic="926e9f64584c6bb73e80178dedb21b4ab464205d181a9eabf8f48de95b1f57180c32f01f6c48fe741d7bc1d9cd0b6a9951ab5663f35ed3b29e48fc84c6cb1aed597fcab8415637551c83f5812b32ff1efa655dee19b77bd39a1875b8155c138e", @generic="4fc043854911c029ac5f102a6e713ddd6b47fecdef45ff181c2e8192717c3693b23c9c183f5ae10969050a809d94a945cf19a20e9564fc83a155ff92e5b7c833ae4521614ba8efc1f108d164c5c1f8025e81ddbc80c44e8f0885d752ca4a037d7411d91d4d9a6830b0cad86e9be093b5b5a79d6deeacd2e485b4ae48693c038597cb9533df23e22e354cf8ef346249ef", @typed={0x10, 0x84, @str='cgroup\xa6$\x00'}]}, @typed={0x14, 0x25, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0xc, 0x19, @u64=0x8}]}, 0x2398}], 0x1}, 0xc0010) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b383f21435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300), 0x0, 0x3}}, 0x20) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 16:54:33 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="232120090fb89188738c1e1c212020"], 0xf) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) r1 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x4788}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7a, &(0x7f0000000200)={r6, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r6, 0x7, 0x2441, 0x1671, 0x7, 0x95c}, 0x14) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x7a, &(0x7f0000000200)={r10, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) 16:54:33 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="232120090fb89188738c1e1c212020"], 0xf) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) r1 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x4788}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7a, &(0x7f0000000200)={r6, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r6, 0x7, 0x2441, 0x1671, 0x7, 0x95c}, 0x14) r7 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x7a, &(0x7f0000000200)={r11, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000080)={r11, 0x7, 0x2441, 0x1671, 0x7, 0x95c}, 0x14) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r11, 0x6}, &(0x7f0000000200)=0x8) socket$inet6_tcp(0xa, 0x1, 0x0) 16:54:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7086270146d0e0206e73ba8c63cd7dcc6760253ef91d1fb12db3ba03f3013932f212159974694a9a441dd36e1f05d75e00683330fbfef7895aaae8915bcba1eb9", 0x66, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='grpjquota=']) 16:54:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7086270146d0e0206e73ba8c63cd7dcc6760253ef91d1fb12db3ba03f3013932f212159974694a9a441dd36e1f05d75e00683330fbfef7895aaae8915bcba1eb9", 0x66, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='grpjqu']) 16:54:34 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="232120090fb89188738c1e1c212020"], 0xf) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) r1 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x4788}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7a, &(0x7f0000000200)={r6, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r6, 0x7, 0x2441, 0x1671, 0x7, 0x95c}, 0x14) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x7a, &(0x7f0000000200)={r10, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) 16:54:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7086270146d0e0206e73ba8c63cd7dcc6760253ef91d1fb12db3ba03f3013932f212159974694a9a441dd36e1f05d75e00683330fbfef7895aaae8915bcba1eb9", 0x66, 0x400}], 0x0, &(0x7f0000000440)=ANY=[]) 16:54:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:34 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="232120090fb89188738c1e1c212020"], 0xf) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) r1 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x4788}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x7a, &(0x7f0000000200)={r6, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r6, 0x7, 0x2441, 0x1671, 0x7, 0x95c}, 0x14) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3ff, 0x10802) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x7a, &(0x7f0000000200)={r10, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0x90) 16:54:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003640)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)=""/195, 0xc3}, {0x0}], 0x2}}, {{&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000900)=""/134, 0x86}, {0x0}, {0x0}, {&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f0000001c80)=""/221, 0xdd}], 0x5}, 0x1}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000600)="3329ad3c05551820d4c8f3a2f2555a789c125a2999d0a9d33c7ffe092d84e734d318fc4e2edb2e2e4b2e9728099946e80320e240be91bd8ad83c5b8a6ac4b15a0556279a65db578df14279f2db48c5fff7eca33ad541527922e6fd3e84081a7264184cee0e23b8340dd40ca4a581ccda", 0x70}, {&(0x7f0000000380)}], 0x2, 0x8) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x8084, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 662.085218][T24588] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 662.090744][T24588] loop3: partition table partially beyond EOD, truncated [ 662.149733][T24588] loop3: p1 start 1 is beyond EOD, truncated [ 662.160334][T24588] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 662.200245][T24588] loop3: p3 size 2 extends beyond EOD, truncated [ 662.225189][T24588] loop3: p4 size 32768 extends beyond EOD, truncated [ 662.257806][T24588] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 662.329982][T24588] loop3: p6 size 32768 extends beyond EOD, truncated [ 662.354576][T24602] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 662.363916][T24602] loop4: partition table partially beyond EOD, truncated [ 662.379937][T24602] loop4: p1 start 1 is beyond EOD, truncated [ 662.386955][T24602] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 662.395635][T24605] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 662.417104][T24605] loop0: partition table partially beyond EOD, truncated [ 662.418509][T24602] loop4: p3 size 2 extends beyond EOD, truncated 16:54:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:34 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 662.453232][T24605] loop0: p1 start 1 is beyond EOD, truncated [ 662.463062][T24605] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 662.464899][T24602] loop4: p4 size 32768 extends beyond EOD, truncated [ 662.477727][T24605] loop0: p3 size 2 extends beyond EOD, truncated [ 662.485753][T24602] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 662.493273][T24605] loop0: p4 size 32768 extends beyond EOD, truncated [ 662.531680][T24605] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 662.578166][T24602] loop4: p6 size 32768 extends beyond EOD, truncated [ 662.638135][T24605] loop0: p6 size 32768 extends beyond EOD, truncated 16:54:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:35 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 16:54:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003640)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)=""/195, 0xc3}, {0x0}], 0x2}}, {{&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000900)=""/134, 0x86}, {0x0}, {0x0}, {&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f0000001c80)=""/221, 0xdd}], 0x5}, 0x1}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000600)="3329ad3c05551820d4c8f3a2f2555a789c125a2999d0a9d33c7ffe092d84e734d318fc4e2edb2e2e4b2e9728099946e80320e240be91bd8ad83c5b8a6ac4b15a0556279a65db578df14279f2db48c5fff7eca33ad541527922e6fd3e84081a7264184cee0e23b8340dd40ca4a581ccda", 0x70}, {&(0x7f0000000380)}], 0x2, 0x8) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x8084, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 16:54:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:35 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 663.477188][T24650] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 663.492286][T24650] loop3: partition table partially beyond EOD, truncated [ 663.527092][T24650] loop3: p1 start 1 is beyond EOD, truncated [ 663.569211][T24650] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 663.600132][T24650] loop3: p3 size 2 extends beyond EOD, truncated [ 663.615825][T24661] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 663.621371][T24661] loop4: partition table partially beyond EOD, truncated [ 663.621435][T24650] loop3: p4 size 32768 extends beyond EOD, truncated [ 663.643337][T24661] loop4: p1 start 1 is beyond EOD, truncated [ 663.649805][T24650] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 663.670400][T24661] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 663.678476][T24650] loop3: p6 size 32768 extends beyond EOD, truncated [ 663.700425][T24661] loop4: p3 size 2 extends beyond EOD, truncated 16:54:36 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 663.732180][T24661] loop4: p4 size 32768 extends beyond EOD, truncated [ 663.775600][T24661] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 663.798219][T24661] loop4: p6 size 32768 extends beyond EOD, truncated 16:54:36 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 663.825313][T24673] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 663.843158][T24673] loop0: partition table partially beyond EOD, truncated [ 663.870323][ T2503] print_req_error: 30 callbacks suppressed [ 663.870347][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 663.887556][ T2503] buffer_io_error: 30 callbacks suppressed [ 663.887567][ T2503] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 663.902143][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 663.907234][T24683] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 663.913581][ T2503] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 663.931577][T24682] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 663.933457][T24650] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 663.951722][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 663.954937][T24673] loop0: p1 start 1 is beyond EOD, truncated [ 663.962823][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 663.985099][ T2504] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 663.996016][ T2504] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 664.004424][ T2504] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 664.015478][ T2504] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 664.023537][ T2504] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 664.034488][ T2504] Buffer I/O error on dev loop3p6, logical block 0, async page read [ 664.042607][ T2504] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 664.053618][ T2504] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 664.061715][ T2504] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 664.067564][T24673] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 664.072721][ T2504] Buffer I/O error on dev loop3p6, logical block 0, async page read [ 664.087873][ T2504] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 664.096019][ T2504] Buffer I/O error on dev loop3p4, logical block 0, async page read 16:54:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003640)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)=""/195, 0xc3}, {0x0}], 0x2}}, {{&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000900)=""/134, 0x86}, {0x0}, {0x0}, {&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f0000001c80)=""/221, 0xdd}], 0x5}, 0x1}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000600)="3329ad3c05551820d4c8f3a2f2555a789c125a2999d0a9d33c7ffe092d84e734d318fc4e2edb2e2e4b2e9728099946e80320e240be91bd8ad83c5b8a6ac4b15a0556279a65db578df14279f2db48c5fff7eca33ad541527922e6fd3e84081a7264184cee0e23b8340dd40ca4a581ccda", 0x70}, {&(0x7f0000000380)}], 0x2, 0x8) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x5, 0x22440) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x8084, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x12000) [ 664.117076][T24673] loop0: p3 size 2 extends beyond EOD, truncated [ 664.132270][T24673] loop0: p4 size 32768 extends beyond EOD, truncated [ 664.148422][T24673] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 664.294909][T24673] loop0: p6 size 32768 extends beyond EOD, truncated 16:54:36 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 16:54:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:37 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 16:54:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:37 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 665.006546][T24720] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 665.011818][T24720] loop4: partition table partially beyond EOD, truncated 16:54:37 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 665.054245][T24720] loop4: p1 start 1 is beyond EOD, truncated [ 665.064141][T24711] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 665.084721][T24711] loop3: partition table partially beyond EOD, truncated [ 665.094936][T24720] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 665.124223][T24711] loop3: p1 start 1 is beyond EOD, truncated [ 665.143847][T24720] loop4: p3 size 2 extends beyond EOD, truncated [ 665.158950][T24711] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 665.166629][T24725] loop0: p1 < > p2 p3 < p5 p6 > p4 16:54:37 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0xd) write$binfmt_script(r0, 0x0, 0x0) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 665.174111][T24725] loop0: partition table partially beyond EOD, truncated [ 665.175394][T24711] loop3: p3 size 2 extends beyond EOD, truncated [ 665.188492][T24720] loop4: p4 size 32768 extends beyond EOD, truncated [ 665.205327][T24711] loop3: p4 size 32768 extends beyond EOD, truncated [ 665.212229][T24720] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 665.234953][T24725] loop0: p1 start 1 is beyond EOD, truncated [ 665.241333][T24725] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 665.251671][T24711] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 665.262687][T24720] loop4: p6 size 32768 extends beyond EOD, truncated [ 665.275198][T24711] loop3: p6 size 32768 extends beyond EOD, truncated [ 665.282387][T24725] loop0: p3 size 2 extends beyond EOD, truncated [ 665.321315][T24725] loop0: p4 size 32768 extends beyond EOD, truncated 16:54:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 665.380849][T24725] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 665.397645][T24725] loop0: p6 size 32768 extends beyond EOD, truncated 16:54:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 16:54:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 16:54:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:54:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 16:54:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:54:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 666.444958][T24771] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 666.464930][T24771] loop4: partition table partially beyond EOD, truncated [ 666.514812][T24771] loop4: p1 start 1 is beyond EOD, truncated [ 666.536568][T24780] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 666.544817][T24771] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 666.554688][T24771] loop4: p3 size 2 extends beyond EOD, truncated [ 666.562268][T24780] loop3: partition table partially beyond EOD, truncated [ 666.583620][T24782] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 666.591493][T24771] loop4: p4 size 32768 extends beyond EOD, truncated [ 666.599566][T24782] loop0: partition table partially beyond EOD, truncated 16:54:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 16:54:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 666.611548][T24780] loop3: p1 start 1 is beyond EOD, truncated [ 666.630436][T24771] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 666.651033][T24782] loop0: p1 start 1 is beyond EOD, truncated [ 666.665245][T24780] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 666.672827][T24771] loop4: p6 size 32768 extends beyond EOD, truncated [ 666.687822][T24782] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 666.706907][T24780] loop3: p3 size 2 extends beyond EOD, truncated 16:54:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 666.727983][T24782] loop0: p3 size 2 extends beyond EOD, truncated [ 666.734343][T24780] loop3: p4 size 32768 extends beyond EOD, truncated [ 666.737725][T24780] loop3: p5 size 1073741824 extends beyond EOD, truncated 16:54:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 666.773286][T24782] loop0: p4 size 32768 extends beyond EOD, truncated [ 666.790364][T24780] loop3: p6 size 32768 extends beyond EOD, truncated [ 666.802296][T24782] loop0: p5 size 1073741824 extends beyond EOD, truncated 16:54:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 666.879417][T24782] loop0: p6 size 32768 extends beyond EOD, truncated 16:54:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:39 executing program 1: socket(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 16:54:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 667.175887][T24830] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 16:54:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 16:54:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 667.607016][T24837] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 667.636068][T24837] loop3: partition table partially beyond EOD, truncated [ 667.643379][T24842] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 667.666391][T24837] loop3: p1 start 1 is beyond EOD, truncated [ 667.676532][T24842] loop4: partition table partially beyond EOD, truncated [ 667.723050][T24842] loop4: p1 start 1 is beyond EOD, truncated [ 667.758334][T24842] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 667.761285][T24837] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 667.770719][T24842] loop4: p3 size 2 extends beyond EOD, truncated [ 667.780566][T24837] loop3: p3 size 2 extends beyond EOD, truncated [ 667.788189][T24837] loop3: p4 size 32768 extends beyond EOD, truncated [ 667.796015][T24837] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 667.804000][T24842] loop4: p4 size 32768 extends beyond EOD, truncated [ 667.813689][T24844] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 667.813778][T24859] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 667.825994][T24837] loop3: p6 size 32768 extends beyond EOD, truncated [ 667.832953][T24844] loop0: partition table partially beyond EOD, truncated [ 667.844314][T24859] loop2: partition table partially beyond EOD, truncated [ 667.847571][T24842] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:54:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 667.870689][T24844] loop0: p1 start 1 is beyond EOD, truncated [ 667.893816][T24859] loop2: p1 start 1 is beyond EOD, truncated [ 667.895228][T24844] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 667.907361][T24842] loop4: p6 size 32768 extends beyond EOD, truncated [ 667.931670][T24844] loop0: p3 size 2 extends beyond EOD, truncated [ 667.938297][T24859] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 667.948643][T24844] loop0: p4 size 32768 extends beyond EOD, truncated [ 667.979630][T24859] loop2: p3 size 2 extends beyond EOD, truncated [ 667.991747][T24844] loop0: p5 size 1073741824 extends beyond EOD, truncated 16:54:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 668.028314][T24844] loop0: p6 size 32768 extends beyond EOD, truncated [ 668.053958][T24859] loop2: p4 size 32768 extends beyond EOD, truncated 16:54:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 16:54:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 668.154991][T24859] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 668.185866][T24859] loop2: p6 size 32768 extends beyond EOD, truncated 16:54:40 executing program 0: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 668.589453][ T7546] __loop_clr_fd: partition scan of loop0 failed (rc=-16) 16:54:41 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:54:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 668.935846][T24892] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 668.946761][T24892] loop3: partition table partially beyond EOD, truncated [ 668.957552][T24892] loop3: p1 start 1 is beyond EOD, truncated [ 668.963701][T24892] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 668.979142][T24892] loop3: p3 size 2 extends beyond EOD, truncated [ 668.989018][T24918] print_req_error: 93 callbacks suppressed [ 668.989040][T24918] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 669.006957][T24892] loop3: p4 size 32768 extends beyond EOD, truncated [ 669.014015][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 669.024975][ T2504] buffer_io_error: 90 callbacks suppressed [ 669.024986][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read 16:54:41 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 669.039078][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 669.050003][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 669.058758][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 669.069770][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 669.078018][T24892] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 669.088158][T24903] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 669.095015][T24903] loop4: partition table partially beyond EOD, truncated [ 669.102927][T24892] loop3: p6 size 32768 extends beyond EOD, truncated [ 669.104893][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 669.113187][T24903] loop4: p1 start 1 is beyond EOD, truncated [ 669.120550][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 669.134672][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 669.144517][T24903] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 669.145627][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 669.155255][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 669.174464][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 669.175408][T24903] loop4: p3 size 2 extends beyond EOD, truncated [ 669.188855][T10685] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 669.193093][T24913] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 669.205120][T24920] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 669.220636][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 669.231593][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 669.243186][T24903] loop4: p4 size 32768 extends beyond EOD, truncated [ 669.253597][T24903] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 669.254798][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 669.271836][ T2503] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 669.280092][ T2503] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 669.280613][T24903] loop4: p6 size 32768 extends beyond EOD, truncated [ 669.288260][ T2503] Buffer I/O error on dev loop2p5, logical block 0, async page read 16:54:41 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:54:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 16:54:42 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:42 executing program 0: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 669.872713][T24931] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 669.924976][T24931] loop2: partition table partially beyond EOD, truncated [ 669.968897][T24931] loop2: p1 start 1 is beyond EOD, truncated [ 669.975633][T24946] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 669.980956][T24946] loop3: partition table partially beyond EOD, truncated [ 670.036577][T24931] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 670.054995][T24946] loop3: p1 start 1 is beyond EOD, truncated 16:54:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 670.077594][T24946] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 670.085032][T24931] loop2: p3 size 2 extends beyond EOD, truncated [ 670.102123][T24931] loop2: p4 size 32768 extends beyond EOD, truncated [ 670.144181][T24946] loop3: p3 size 2 extends beyond EOD, truncated [ 670.155424][T24931] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 670.206584][T24946] loop3: p4 size 32768 extends beyond EOD, truncated [ 670.235362][T24946] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 670.238018][T24958] loop0: p1 < > p2 p3 < p5 p6 > p4 16:54:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 670.258643][T24931] loop2: p6 size 32768 extends beyond EOD, truncated [ 670.277367][T24958] loop0: partition table partially beyond EOD, truncated [ 670.278296][T24946] loop3: p6 size 32768 extends beyond EOD, truncated 16:54:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 670.305538][T24958] loop0: p1 start 1 is beyond EOD, truncated [ 670.319626][T24958] loop0: p2 size 1073741824 extends beyond EOD, truncated 16:54:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 670.382514][T24958] loop0: p3 size 2 extends beyond EOD, truncated [ 670.392288][T24959] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 670.397650][T24959] loop4: partition table partially beyond EOD, truncated [ 670.408934][T24958] loop0: p4 size 32768 extends beyond EOD, truncated [ 670.415591][T24959] loop4: p1 start 1 is beyond EOD, truncated [ 670.418543][T24958] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 670.428233][T24959] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 670.433714][T24958] loop0: p6 size 32768 extends beyond EOD, truncated [ 670.443095][T24959] loop4: p3 size 2 extends beyond EOD, truncated [ 670.493927][T24959] loop4: p4 size 32768 extends beyond EOD, truncated [ 670.512779][T24959] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 670.523602][T24959] loop4: p6 size 32768 extends beyond EOD, truncated 16:54:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:54:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0xf0}, 0x2c) 16:54:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:43 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 16:54:43 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 16:54:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 671.198460][T24989] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 671.229153][T24989] loop2: partition table partially beyond EOD, truncated [ 671.307994][T24989] loop2: p1 start 1 is beyond EOD, truncated [ 671.315293][T24989] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 671.442445][T24989] loop2: p3 size 2 extends beyond EOD, truncated 16:54:43 executing program 1: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 671.520784][T24989] loop2: p4 size 32768 extends beyond EOD, truncated 16:54:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 671.565328][T25014] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 671.608721][T25014] loop3: partition table partially beyond EOD, truncated [ 671.615986][T24989] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 671.622008][T25014] loop3: p1 start 1 is beyond EOD, truncated 16:54:44 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 16:54:44 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) [ 671.683256][T25014] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 671.685091][T24989] loop2: p6 size 32768 extends beyond EOD, truncated [ 671.720494][T25014] loop3: p3 size 2 extends beyond EOD, truncated 16:54:44 executing program 2: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 671.780134][T25014] loop3: p4 size 32768 extends beyond EOD, truncated 16:54:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 671.842941][T25014] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 671.874024][T25014] loop3: p6 size 32768 extends beyond EOD, truncated 16:54:44 executing program 1: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:44 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, 0x0) 16:54:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 672.657823][T25059] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 672.684817][T25059] loop2: partition table partially beyond EOD, truncated 16:54:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:54:45 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) [ 672.726970][T25059] loop2: p1 start 1 is beyond EOD, truncated [ 672.743151][T25059] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:54:45 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) [ 672.805445][T25059] loop2: p3 size 2 extends beyond EOD, truncated [ 672.825093][T25088] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 672.844055][T25059] loop2: p4 size 32768 extends beyond EOD, truncated 16:54:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:54:45 executing program 1: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 672.869265][T25088] loop3: partition table partially beyond EOD, truncated [ 672.913638][T25059] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 672.944910][T25088] loop3: p1 start 1 is beyond EOD, truncated [ 672.965210][T25059] loop2: p6 size 32768 extends beyond EOD, truncated [ 672.967458][T25088] loop3: p2 size 1073741824 extends beyond EOD, truncated 16:54:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 673.057572][T25088] loop3: p3 size 2 extends beyond EOD, truncated [ 673.081541][T25088] loop3: p4 size 32768 extends beyond EOD, truncated [ 673.098931][T25088] loop3: p5 size 1073741824 extends beyond EOD, truncated 16:54:45 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) [ 673.162797][T25088] loop3: p6 size 32768 extends beyond EOD, truncated 16:54:45 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) 16:54:45 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) 16:54:45 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:54:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) 16:54:46 executing program 1: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 16:54:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) [ 673.994750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 674.000871][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:54:46 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 16:54:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) 16:54:46 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) 16:54:46 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) [ 674.224796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 674.230578][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:54:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100), 0x0) 16:54:46 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) [ 674.694846][T25157] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 674.700080][T25157] loop3: partition table partially beyond EOD, truncated 16:54:47 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) [ 674.777749][T25157] loop3: p1 start 1 is beyond EOD, truncated [ 674.805065][T25157] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 674.859412][T25157] loop3: p3 size 2 extends beyond EOD, truncated [ 674.878346][T25157] loop3: p4 size 32768 extends beyond EOD, truncated [ 674.924224][T25157] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 674.943408][T25157] loop3: p6 size 32768 extends beyond EOD, truncated 16:54:47 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:47 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 16:54:47 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) 16:54:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100), 0x0) 16:54:47 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 16:54:47 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) 16:54:47 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 16:54:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100), 0x0) [ 675.266235][T25220] print_req_error: 34 callbacks suppressed [ 675.266262][T25220] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 675.266398][T25226] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 675.272248][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 675.283359][ T7554] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 675.292639][T25227] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 675.301714][ T2503] buffer_io_error: 30 callbacks suppressed [ 675.301725][ T2503] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 675.338613][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 675.349526][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 675.357686][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 675.368590][ T2503] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 675.376671][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 675.387652][ T2503] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 675.395764][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 675.406844][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 675.414883][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 675.425843][ T2503] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 675.433922][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 675.445003][ T2503] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 675.453014][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 675.461099][ T2503] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 675.469131][ T2503] Buffer I/O error on dev loop3p2, logical block 0, async page read [ 675.520362][T25225] Dev loop4: unable to read RDB block 1 [ 675.541868][T25225] loop4: unable to read partition table [ 675.565175][T25232] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 675.584331][T25225] loop4: partition table beyond EOD, truncated [ 675.607441][T25225] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 675.716067][T25242] Dev loop0: unable to read RDB block 1 [ 675.722331][T25242] loop0: unable to read partition table 16:54:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{0x0}], 0x1) 16:54:48 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) 16:54:48 executing program 1: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 675.764807][T25242] loop0: partition table beyond EOD, truncated [ 675.772577][T25242] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:48 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) 16:54:48 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{0x0}], 0x1) 16:54:48 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) [ 676.064733][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 676.070785][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 676.239063][T25264] Dev loop4: unable to read RDB block 1 [ 676.248226][T25264] loop4: unable to read partition table [ 676.286035][T25264] loop4: partition table beyond EOD, truncated 16:54:48 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) 16:54:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{0x0}], 0x1) [ 676.333638][T25264] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 16:54:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0xf0}, 0x2c) [ 676.404706][T25274] Dev loop0: unable to read RDB block 1 [ 676.410392][T25274] loop0: unable to read partition table [ 676.430404][T25274] loop0: partition table beyond EOD, truncated [ 676.470757][T25274] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 676.479116][T25269] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 676.487365][T25269] loop3: partition table partially beyond EOD, truncated 16:54:49 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) [ 676.568685][T25269] loop3: p1 start 1 is beyond EOD, truncated [ 676.590712][T25269] loop3: p2 size 1073741824 extends beyond EOD, truncated 16:54:49 executing program 1: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 676.617268][T25269] loop3: p3 size 2 extends beyond EOD, truncated 16:54:49 executing program 5: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 676.659115][T25269] loop3: p4 size 32768 extends beyond EOD, truncated [ 676.673244][T25269] loop3: p5 size 1073741824 extends beyond EOD, truncated 16:54:49 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) [ 676.759974][T25269] loop3: p6 size 32768 extends beyond EOD, truncated [ 676.868652][T25299] Dev loop4: unable to read RDB block 1 [ 676.874254][T25299] loop4: unable to read partition table 16:54:49 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) [ 676.975132][T25299] loop4: partition table beyond EOD, truncated [ 676.991225][T25299] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 677.085261][T25310] Dev loop0: unable to read RDB block 1 [ 677.104709][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 677.104968][T25310] loop0: unable to read partition table [ 677.110501][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:54:49 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 677.194645][T25310] loop0: partition table beyond EOD, truncated 16:54:49 executing program 5: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 677.315966][T25310] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:49 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 16:54:49 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) [ 677.504725][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 677.510503][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:54:50 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 16:54:50 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 677.735285][T25332] Dev loop4: unable to read RDB block 1 [ 677.745694][T25332] loop4: unable to read partition table [ 677.778990][T25332] loop4: partition table beyond EOD, truncated [ 677.807982][T25332] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 677.819339][T25341] Dev loop2: unable to read RDB block 1 [ 677.825118][T25341] loop2: unable to read partition table [ 677.841849][T25341] loop2: partition table beyond EOD, truncated [ 677.852624][T25341] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 677.919287][T25328] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 677.943752][T25328] loop3: partition table partially beyond EOD, truncated [ 677.965180][T25328] loop3: p1 start 1 is beyond EOD, truncated [ 677.972855][T25347] Dev loop0: unable to read RDB block 1 [ 677.977284][T25328] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 677.992893][T25347] loop0: unable to read partition table [ 678.026113][T25328] loop3: p3 size 2 extends beyond EOD, truncated [ 678.034761][T25347] loop0: partition table beyond EOD, truncated [ 678.041227][T25347] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 678.073342][T25328] loop3: p4 size 32768 extends beyond EOD, truncated [ 678.117459][T25328] loop3: p5 size 1073741824 extends beyond EOD, truncated 16:54:50 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 678.162219][T25328] loop3: p6 size 32768 extends beyond EOD, truncated 16:54:50 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 16:54:50 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) 16:54:50 executing program 5: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 16:54:50 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:54:51 executing program 1: creat(0x0, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 678.626949][T25369] Dev loop4: unable to read RDB block 1 [ 678.648868][T25369] loop4: unable to read partition table [ 678.675852][T25372] Dev loop2: unable to read RDB block 1 [ 678.681480][T25372] loop2: unable to read partition table [ 678.714854][T25369] loop4: partition table beyond EOD, truncated [ 678.722438][T25369] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 678.744341][T25376] Dev loop0: unable to read RDB block 1 [ 678.750162][T25376] loop0: unable to read partition table [ 678.756858][T25372] loop2: partition table beyond EOD, truncated [ 678.774306][T25376] loop0: partition table beyond EOD, truncated [ 678.813095][T25376] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 678.870477][T25372] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:54:51 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 16:54:51 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 679.184744][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.190626][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 679.200102][T25386] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 679.208263][T25386] loop3: partition table partially beyond EOD, truncated [ 679.241580][T25386] loop3: p1 start 1 is beyond EOD, truncated [ 679.260339][T25386] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 679.290904][T25386] loop3: p3 size 2 extends beyond EOD, truncated 16:54:51 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) [ 679.363405][T25386] loop3: p4 size 32768 extends beyond EOD, truncated [ 679.379850][T25386] loop3: p5 size 1073741824 extends beyond EOD, truncated 16:54:51 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) [ 679.412633][T25386] loop3: p6 size 32768 extends beyond EOD, truncated [ 679.420359][T25400] Dev loop0: unable to read RDB block 1 [ 679.421314][T25396] Dev loop4: unable to read RDB block 1 [ 679.449580][T25396] loop4: unable to read partition table [ 679.485242][T25400] loop0: unable to read partition table [ 679.520358][T25400] loop0: partition table beyond EOD, truncated [ 679.524801][T25396] loop4: partition table beyond EOD, truncated [ 679.533517][T25400] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 679.543073][T25396] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 16:54:52 executing program 1: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 679.675860][T25408] Dev loop2: unable to read RDB block 1 [ 679.684030][T25408] loop2: unable to read partition table 16:54:52 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 679.745156][T25408] loop2: partition table beyond EOD, truncated [ 679.758443][T25408] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:54:52 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 16:54:52 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) 16:54:52 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 16:54:52 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 680.145044][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 680.151214][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 680.175131][T25430] Dev loop0: unable to read RDB block 1 16:54:52 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) [ 680.224551][T25430] loop0: unable to read partition table [ 680.230285][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 680.230328][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 680.265075][T25438] Dev loop4: unable to read RDB block 1 [ 680.291100][T25438] loop4: unable to read partition table [ 680.306746][T25438] loop4: partition table beyond EOD, truncated [ 680.326688][T25430] loop0: partition table beyond EOD, truncated [ 680.347426][T25438] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 680.359306][T25443] Dev loop2: unable to read RDB block 1 [ 680.381961][T25430] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 680.402038][T25443] loop2: unable to read partition table [ 680.429254][T25443] loop2: partition table beyond EOD, truncated [ 680.461743][T25443] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 680.465218][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 680.475935][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 680.498700][T25433] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 680.504039][T25433] loop3: partition table partially beyond EOD, truncated 16:54:52 executing program 5: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 680.523315][T25433] loop3: p1 start 1 is beyond EOD, truncated [ 680.538042][T25433] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 680.552235][T25433] loop3: p3 size 2 extends beyond EOD, truncated 16:54:53 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 16:54:53 executing program 1: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 680.594013][T25433] loop3: p4 size 32768 extends beyond EOD, truncated [ 680.601637][T25433] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 680.614045][T25433] loop3: p6 size 32768 extends beyond EOD, truncated 16:54:53 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 16:54:53 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) [ 680.882640][T25458] Dev loop4: unable to read RDB block 1 16:54:53 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 680.923097][T25458] loop4: unable to read partition table [ 680.944753][T25458] loop4: partition table beyond EOD, truncated [ 681.011533][T25458] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 681.099215][T25473] Dev loop2: unable to read RDB block 1 [ 681.106092][T25473] loop2: unable to read partition table [ 681.139258][T25473] loop2: partition table beyond EOD, truncated [ 681.178090][T25473] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 681.243841][T25478] Dev loop0: unable to read RDB block 1 [ 681.264728][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 681.270541][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:54:53 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 16:54:53 executing program 1: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 681.302582][T25478] loop0: unable to read partition table [ 681.327018][T25478] loop0: partition table beyond EOD, truncated [ 681.360445][T25478] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:53 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 681.588615][T25483] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 681.620397][T25483] loop3: partition table partially beyond EOD, truncated [ 681.657946][T25493] Dev loop4: unable to read RDB block 1 16:54:54 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) [ 681.689801][T25493] loop4: unable to read partition table [ 681.705077][T25483] loop3: p1 start 1 is beyond EOD, truncated [ 681.713225][T25493] loop4: partition table beyond EOD, truncated [ 681.726188][T25499] Dev loop2: unable to read RDB block 1 16:54:54 executing program 5: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 681.744510][T25499] loop2: unable to read partition table [ 681.747430][T25493] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 681.770367][T25483] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 681.790599][T25499] loop2: partition table beyond EOD, truncated [ 681.854528][T25499] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 681.863489][T25483] loop3: p3 size 2 extends beyond EOD, truncated [ 681.913382][T25483] loop3: p4 size 32768 extends beyond EOD, truncated [ 681.982401][T25483] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 681.990342][T25508] Dev loop0: unable to read RDB block 1 [ 682.006552][T25508] loop0: unable to read partition table [ 682.024987][T25508] loop0: partition table beyond EOD, truncated [ 682.039282][T25483] loop3: p6 size 32768 extends beyond EOD, truncated [ 682.052030][T25508] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:54 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:54:54 executing program 1: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 16:54:54 executing program 5: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 16:54:54 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 16:54:54 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 682.369729][T25529] Dev loop4: unable to read RDB block 1 16:54:54 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 682.461596][T25526] Dev loop2: unable to read RDB block 1 [ 682.472069][T25529] loop4: unable to read partition table [ 682.494759][T25526] loop2: unable to read partition table 16:54:55 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 682.534781][T25529] loop4: partition table beyond EOD, truncated [ 682.544876][T25526] loop2: partition table beyond EOD, truncated [ 682.554789][T25529] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 682.635228][T25528] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 682.635927][T25526] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 682.640536][T25528] loop3: partition table partially beyond EOD, truncated [ 682.700983][T25528] loop3: p1 start 1 is beyond EOD, truncated [ 682.724893][T25528] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 682.768014][T25545] Dev loop0: unable to read RDB block 1 [ 682.786078][T25545] loop0: unable to read partition table [ 682.790136][T25528] loop3: p3 size 2 extends beyond EOD, truncated 16:54:55 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 682.847058][T25545] loop0: partition table beyond EOD, truncated [ 682.883260][T25545] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:55 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) [ 682.917875][T25528] loop3: p4 size 32768 extends beyond EOD, truncated [ 682.950397][T25528] loop3: p5 size 1073741824 extends beyond EOD, truncated 16:54:55 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 16:54:55 executing program 5: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 682.989063][T25528] loop3: p6 size 32768 extends beyond EOD, truncated 16:54:55 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 683.102855][T25556] Dev loop4: unable to read RDB block 1 [ 683.115398][T25556] loop4: unable to read partition table [ 683.125930][T25556] loop4: partition table beyond EOD, truncated [ 683.190505][T25556] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 16:54:55 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 16:54:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 683.336764][T25569] Dev loop2: unable to read RDB block 1 [ 683.404772][T25569] loop2: unable to read partition table [ 683.443848][T25569] loop2: partition table beyond EOD, truncated [ 683.455230][T25577] Dev loop0: unable to read RDB block 1 [ 683.466955][T25569] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 683.475174][T25577] loop0: unable to read partition table [ 683.505897][T25577] loop0: partition table beyond EOD, truncated 16:54:56 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 683.559999][T25577] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:56 executing program 1: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 16:54:56 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 16:54:56 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 683.933198][T25594] Dev loop4: unable to read RDB block 1 [ 683.950496][T25594] loop4: unable to read partition table [ 683.967925][T25594] loop4: partition table beyond EOD, truncated [ 683.975422][T25594] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 683.997401][T25582] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 684.015041][T25582] loop3: partition table partially beyond EOD, truncated [ 684.035589][T25582] loop3: p1 start 1 is beyond EOD, truncated 16:54:56 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 684.074145][T25582] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 684.082509][T25582] loop3: p3 size 2 extends beyond EOD, truncated 16:54:56 executing program 5: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 684.120052][T25582] loop3: p4 size 32768 extends beyond EOD, truncated [ 684.127687][T25582] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 684.140628][T25582] loop3: p6 size 32768 extends beyond EOD, truncated [ 684.160054][T25605] Dev loop2: unable to read RDB block 1 [ 684.172156][T25605] loop2: unable to read partition table [ 684.183567][T25605] loop2: partition table beyond EOD, truncated [ 684.223187][T25605] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 684.244468][T25610] Dev loop0: unable to read RDB block 1 [ 684.265878][T25610] loop0: unable to read partition table 16:54:56 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 684.305941][T25610] loop0: partition table beyond EOD, truncated [ 684.324431][T25610] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 684.384727][ C0] net_ratelimit: 6 callbacks suppressed [ 684.384736][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 684.396194][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:54:56 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:54:56 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:54:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) [ 684.624725][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 684.630500][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 684.715221][T25630] Dev loop4: unable to read RDB block 1 [ 684.737548][T25630] loop4: unable to read partition table 16:54:57 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 684.787766][T25630] loop4: partition table beyond EOD, truncated [ 684.844377][T25630] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 16:54:57 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 684.994951][T25641] Dev loop2: unable to read RDB block 1 [ 685.020338][T25641] loop2: unable to read partition table [ 685.029282][T25641] loop2: partition table beyond EOD, truncated [ 685.038913][T25641] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 685.105364][T25649] Dev loop0: unable to read RDB block 1 [ 685.118907][T25649] loop0: unable to read partition table [ 685.131916][T25649] loop0: partition table beyond EOD, truncated [ 685.138865][T25649] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:57 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:54:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 16:54:57 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:54:57 executing program 5: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) 16:54:57 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:54:57 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 685.489752][T25668] Dev loop4: unable to read RDB block 1 [ 685.543106][T25668] loop4: unable to read partition table 16:54:58 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 685.607310][T25668] loop4: partition table beyond EOD, truncated [ 685.624842][T25668] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 685.645867][T25678] Dev loop2: unable to read RDB block 1 [ 685.651584][T25678] loop2: unable to read partition table [ 685.684915][T25678] loop2: partition table beyond EOD, truncated [ 685.693079][T25678] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 685.824742][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 685.830590][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 685.849079][T25681] Dev loop0: unable to read RDB block 1 [ 685.863136][T25681] loop0: unable to read partition table 16:54:58 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 685.900445][T25681] loop0: partition table beyond EOD, truncated [ 685.934051][T25681] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:58 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 16:54:58 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:54:58 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:54:58 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:54:58 executing program 5: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 686.215537][T25692] Dev loop4: unable to read RDB block 1 [ 686.257959][T25692] loop4: unable to read partition table [ 686.296916][T25705] Dev loop2: unable to read RDB block 1 [ 686.302643][T25705] loop2: unable to read partition table [ 686.314788][T25692] loop4: partition table beyond EOD, truncated [ 686.321134][T25705] loop2: partition table beyond EOD, truncated [ 686.340966][T25692] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 686.351747][T25705] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:54:58 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 686.355180][T25713] Dev loop0: unable to read RDB block 1 [ 686.379358][T25713] loop0: unable to read partition table [ 686.398460][T25713] loop0: partition table beyond EOD, truncated [ 686.410808][T25713] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 686.464977][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 686.471821][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:54:59 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) 16:54:59 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:54:59 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 686.704713][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 686.710519][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:54:59 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:54:59 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 686.976040][T25732] Dev loop4: unable to read RDB block 1 [ 686.996601][T25732] loop4: unable to read partition table [ 687.007479][T25732] loop4: partition table beyond EOD, truncated [ 687.015838][T25732] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 687.048683][T25739] Dev loop2: unable to read RDB block 1 [ 687.054856][T25739] loop2: unable to read partition table [ 687.074823][T25739] loop2: partition table beyond EOD, truncated [ 687.084272][T25739] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:54:59 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 687.219316][T25740] Dev loop0: unable to read RDB block 1 [ 687.239555][T25740] loop0: unable to read partition table [ 687.245736][T25740] loop0: partition table beyond EOD, truncated [ 687.251940][T25740] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:54:59 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:54:59 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) 16:54:59 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:54:59 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:55:00 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:55:00 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:55:00 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 687.765108][T25759] Dev loop4: unable to read RDB block 1 [ 687.787587][T25768] Dev loop2: unable to read RDB block 1 [ 687.796627][T25768] loop2: unable to read partition table [ 687.804655][T25759] loop4: unable to read partition table [ 687.817922][T25768] loop2: partition table beyond EOD, truncated [ 687.826960][T25759] loop4: partition table beyond EOD, truncated 16:55:00 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:55:00 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 687.863917][T25768] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 687.898901][T25759] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 688.046246][T25782] Dev loop0: unable to read RDB block 1 [ 688.069718][T25782] loop0: unable to read partition table [ 688.099882][T25782] loop0: partition table beyond EOD, truncated [ 688.108545][T25782] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:55:00 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:55:00 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:55:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, &(0x7f0000000100)) 16:55:00 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:55:00 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 16:55:00 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 688.465232][T25798] Dev loop4: unable to read RDB block 1 [ 688.476649][T25798] loop4: unable to read partition table [ 688.514812][T25798] loop4: partition table beyond EOD, truncated [ 688.529102][T25798] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 16:55:01 executing program 1: creat(0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) [ 688.684918][T25818] Dev loop2: unable to read RDB block 1 [ 688.713174][T25818] loop2: unable to read partition table [ 688.722384][T25818] loop2: partition table beyond EOD, truncated 16:55:01 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) [ 688.729990][T25820] Dev loop0: unable to read RDB block 1 [ 688.739719][T25818] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 688.745585][T25820] loop0: unable to read partition table [ 688.753853][T25820] loop0: partition table beyond EOD, truncated [ 688.770280][T25820] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:55:01 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 16:55:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) 16:55:01 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:55:01 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) [ 689.247461][T25839] Dev loop4: unable to read RDB block 1 [ 689.275477][T25839] loop4: unable to read partition table [ 689.289741][T25843] Dev loop3: unable to read RDB block 1 16:55:01 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 689.305738][T25839] loop4: partition table beyond EOD, truncated [ 689.314136][T25843] loop3: unable to read partition table [ 689.325669][T25839] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 689.344900][T25843] loop3: partition table beyond EOD, truncated 16:55:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 689.351290][T25843] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 689.405165][T25848] Dev loop2: unable to read RDB block 1 [ 689.410897][T25848] loop2: unable to read partition table [ 689.481967][T25848] loop2: partition table beyond EOD, truncated 16:55:02 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 689.564778][T25848] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:55:02 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0xb) 16:55:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 689.618760][T25858] Dev loop0: unable to read RDB block 1 [ 689.628280][T25858] loop0: unable to read partition table [ 689.635080][T25858] loop0: partition table beyond EOD, truncated [ 689.641317][T25858] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:55:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) 16:55:02 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0xb) 16:55:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 689.933029][T25864] Dev loop4: unable to read RDB block 1 [ 689.965503][T25864] loop4: unable to read partition table 16:55:02 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 690.009159][T25864] loop4: partition table beyond EOD, truncated [ 690.026918][T25864] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 690.035905][T25878] Dev loop3: unable to read RDB block 1 16:55:02 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 690.069343][T25878] loop3: unable to read partition table [ 690.090089][T25878] loop3: partition table beyond EOD, truncated [ 690.114199][T25878] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:55:02 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:02 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 690.265373][T25891] Dev loop0: unable to read RDB block 1 [ 690.294839][T25891] loop0: unable to read partition table [ 690.341018][T25896] Dev loop2: unable to read RDB block 1 [ 690.344385][T25891] loop0: partition table beyond EOD, truncated [ 690.369942][T25896] loop2: unable to read partition table 16:55:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x1c0}]) [ 690.392456][T25891] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 690.406234][T25906] FAULT_INJECTION: forcing a failure. [ 690.406234][T25906] name failslab, interval 1, probability 0, space 0, times 1 [ 690.434864][T25906] CPU: 0 PID: 25906 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 690.443317][T25906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.454000][T25906] Call Trace: [ 690.457529][T25906] dump_stack+0x11d/0x181 [ 690.462071][T25906] should_fail.cold+0xa/0x1a [ 690.466893][T25906] __should_failslab+0xee/0x130 [ 690.471784][T25906] should_failslab+0x9/0x14 [ 690.476295][T25906] __kmalloc+0x53/0x690 [ 690.480752][T25906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.487109][T25906] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 690.493137][T25906] ? sock_kmalloc+0xbf/0x110 [ 690.497753][T25906] sock_kmalloc+0xbf/0x110 [ 690.502209][T25906] hash_alloc_result.part.0+0x5a/0xb0 [ 690.508257][T25906] hash_recvmsg+0x367/0x540 [ 690.513121][T25906] ? apparmor_socket_recvmsg+0x3b/0x50 [ 690.518643][T25906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.525040][T25906] ? hash_alloc_result.part.0+0xb0/0xb0 [ 690.530850][T25906] sock_recvmsg+0x92/0xb0 [ 690.536262][T25906] sock_read_iter+0x15f/0x1e0 [ 690.540979][T25906] do_iter_readv_writev+0x54b/0x5b0 [ 690.546185][T25906] do_iter_read+0x1fc/0x3d0 [ 690.550719][T25906] ? import_iovec+0x17a/0x220 [ 690.555404][T25906] vfs_readv+0x9c/0xf0 [ 690.559496][T25906] ? __fget_light+0xaf/0x190 [ 690.564114][T25906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.570451][T25906] do_readv+0xe3/0x250 [ 690.574534][T25906] __x64_sys_readv+0x4e/0x60 [ 690.579159][T25906] do_syscall_64+0xcc/0x370 [ 690.583758][T25906] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.589952][T25906] RIP: 0033:0x45a679 [ 690.594256][T25906] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.614055][T25906] RSP: 002b:00007fafb0853c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 690.622469][T25906] RAX: ffffffffffffffda RBX: 00007fafb0853c90 RCX: 000000000045a679 [ 690.630841][T25906] RDX: 0000000000000001 RSI: 0000000020000100 RDI: 0000000000000004 [ 690.639096][T25906] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 690.647088][T25906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fafb08546d4 [ 690.655077][T25906] R13: 00000000004c8105 R14: 00000000004decd8 R15: 0000000000000005 [ 690.665361][T25896] loop2: partition table beyond EOD, truncated [ 690.673144][T25896] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 690.725178][T25911] Dev loop4: unable to read RDB block 1 [ 690.731225][T25911] loop4: unable to read partition table 16:55:03 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 16:55:03 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 690.806757][T25911] loop4: partition table beyond EOD, truncated [ 690.825271][T25916] Dev loop3: unable to read RDB block 1 [ 690.835101][T25911] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 690.847334][T25916] loop3: unable to read partition table [ 690.906773][T25916] loop3: partition table beyond EOD, truncated [ 690.962953][T25916] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:03 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:55:03 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 16:55:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 691.089169][T25927] Dev loop0: unable to read RDB block 1 [ 691.108813][T25927] loop0: unable to read partition table [ 691.121754][T25927] loop0: partition table beyond EOD, truncated [ 691.161390][T25927] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:55:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:55:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 16:55:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 691.425389][T25944] Dev loop4: unable to read RDB block 1 [ 691.451291][T25944] loop4: unable to read partition table [ 691.477498][T25944] loop4: partition table beyond EOD, truncated [ 691.504996][T25949] Dev loop2: unable to read RDB block 1 16:55:03 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 691.520934][T25949] loop2: unable to read partition table [ 691.555139][T25944] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 691.579820][T25949] loop2: partition table beyond EOD, truncated 16:55:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 691.604855][T25949] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 691.615549][T25958] Dev loop3: unable to read RDB block 1 [ 691.670284][T25958] loop3: unable to read partition table 16:55:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x20000065}], 0x1) [ 691.734150][T25958] loop3: partition table beyond EOD, truncated [ 691.753506][T25958] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:04 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 16:55:04 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 16:55:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x7ffff000}], 0x1) 16:55:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 691.945253][T25970] Dev loop0: unable to read RDB block 1 [ 691.970448][T25970] loop0: unable to read partition table [ 692.024890][T25970] loop0: partition table beyond EOD, truncated [ 692.054884][T25970] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:55:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 692.195177][T25984] Dev loop4: unable to read RDB block 1 [ 692.203148][T25984] loop4: unable to read partition table [ 692.212474][T25984] loop4: partition table beyond EOD, truncated [ 692.224295][T25984] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 16:55:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 692.288272][T25992] Dev loop2: unable to read RDB block 1 [ 692.316972][T25992] loop2: unable to read partition table 16:55:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x2) 16:55:04 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 692.395177][T25999] Dev loop3: unable to read RDB block 1 [ 692.410498][T25992] loop2: partition table beyond EOD, truncated [ 692.418192][T25999] loop3: unable to read partition table [ 692.434941][T25999] loop3: partition table beyond EOD, truncated [ 692.442105][T25992] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 692.453725][T25999] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:05 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 16:55:05 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:05 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 16:55:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x8) 16:55:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 692.745283][T26015] Dev loop0: unable to read RDB block 1 [ 692.799144][T26015] loop0: unable to read partition table [ 692.851185][T26015] loop0: partition table beyond EOD, truncated [ 692.875644][T26015] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 692.888995][T26022] Dev loop4: unable to read RDB block 1 [ 692.900791][T26022] loop4: unable to read partition table [ 692.929912][T26022] loop4: partition table beyond EOD, truncated 16:55:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x1a3) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) timer_create(0x7, &(0x7f0000000080)={0x0, 0x29, 0x3, @tid=r2}, &(0x7f00000000c0)) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x482000) ioctl$KVM_SMI(r3, 0xaeb7) [ 692.957606][T26022] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 692.969206][T26032] Dev loop2: unable to read RDB block 1 [ 692.997615][T26032] loop2: unable to read partition table [ 693.013459][T26032] loop2: partition table beyond EOD, truncated [ 693.035115][T26035] Dev loop3: unable to read RDB block 1 [ 693.040839][T26035] loop3: unable to read partition table [ 693.052625][T26032] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 693.066522][T26035] loop3: partition table beyond EOD, truncated [ 693.074002][T26035] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:05 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:05 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 16:55:05 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 16:55:05 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 16:55:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x1, 0x0, 0x80, 0x2, 0x0, 0x3, 0x510c1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x81, 0x20e480dceca7c3d3, @perf_config_ext={0x9ac, 0x568eac8d}, 0x0, 0x1, 0x80000001, 0x2, 0x6, 0x8, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x1c) 16:55:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) [ 693.480874][T26057] Dev loop0: unable to read RDB block 1 [ 693.495238][T26057] loop0: unable to read partition table [ 693.525887][T26057] loop0: partition table beyond EOD, truncated [ 693.539653][T26057] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 16:55:06 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl(r1, 0x8, &(0x7f0000000000)="7d87c39c3f90b1adaf1ad899bba4f50e234cf6789ca946a90c3f88f1c01d643408") r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 693.666560][T26068] Dev loop3: unable to read RDB block 1 [ 693.673230][T26068] loop3: unable to read partition table [ 693.691448][T26068] loop3: partition table beyond EOD, truncated [ 693.702361][T26068] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:06 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) [ 693.910878][T26072] Dev loop2: unable to read RDB block 1 [ 693.918978][T26072] loop2: unable to read partition table [ 693.940271][T26072] loop2: partition table beyond EOD, truncated [ 693.978179][T26072] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:55:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:06 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 16:55:06 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 16:55:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r7, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000000c0)={r7, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r7, 0x6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r8, 0x3}, 0x8) accept4$alg(r1, 0x0, 0x0, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) fcntl$setstatus(r10, 0x4, 0x40400) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000080)={0x6, 0x6, 0x4, 0x4, 0xfffffffc, 0x401}) 16:55:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 694.404920][T26112] Dev loop3: unable to read RDB block 1 16:55:06 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 16:55:06 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 694.448987][T26112] loop3: unable to read partition table [ 694.470702][T26112] loop3: partition table beyond EOD, truncated 16:55:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x10000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x59, "757f7918c83bd6e983de73da752f9c7238d8874af32b7b37df806ab3487d09738dd3279926f138eef67e27cadabb14db2516a6843d544cb4a827c26ced0e8471081238476966d797cc01a4d3954f47c13751954891187d2304"}, &(0x7f0000000140)=0x61) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x4, 0x1, 0x3, 0x7, r2}, &(0x7f00000001c0)=0x10) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 694.503737][T26112] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) getsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x1) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:07 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 16:55:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) [ 694.916991][T26136] Dev loop2: unable to read RDB block 1 [ 694.940274][T26136] loop2: unable to read partition table 16:55:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 694.965172][T26136] loop2: partition table beyond EOD, truncated [ 694.984530][T26136] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:55:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r7, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000000c0)={r7, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r7, 0x6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r8, 0x3}, 0x8) accept4$alg(r1, 0x0, 0x0, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) fcntl$setstatus(r10, 0x4, 0x40400) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000080)={0x6, 0x6, 0x4, 0x4, 0xfffffffc, 0x401}) 16:55:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@canfd={{0x1, 0x1, 0x1, 0x1}, 0x38, 0x1, 0x0, 0x0, "996baa90eabf3db7903d1faca1003e116269a34d181ad45b3a0a7f15ea3cf91f61ef7425b292b6eb91f9a8d1f02af52829e776102fd2f9742647ab1fd331451d"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x800) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:07 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) [ 695.315645][T26162] Dev loop3: unable to read RDB block 1 [ 695.330437][T26162] loop3: unable to read partition table 16:55:07 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 695.356999][T26162] loop3: partition table beyond EOD, truncated [ 695.379657][T26162] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r0, r3) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f0000000000)={0x0, "641b28f9be16810000fdd33943cb4adfe67fa61a5df3ceb7763aa53698542700", 0x3, 0x1}) r5 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='md5sum/eth0vboxnet0vmnet0,posix_acl_access!+lo\x00', 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000240)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x1}, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4(r8, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, &(0x7f0000000140)=0x80, 0x800) 16:55:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r7, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000000c0)={r7, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r7, 0x6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r8, 0x3}, 0x8) accept4$alg(r1, 0x0, 0x0, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) fcntl$setstatus(r10, 0x4, 0x40400) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000080)={0x6, 0x6, 0x4, 0x4, 0xfffffffc, 0x401}) 16:55:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 695.654991][T26183] Dev loop2: unable to read RDB block 1 [ 695.673161][T26183] loop2: unable to read partition table [ 695.732648][T26183] loop2: partition table beyond EOD, truncated [ 695.770681][T26183] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:55:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0xe) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r0, r3) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f0000000000)={0x0, "641b28f9be16810000fdd33943cb4adfe67fa61a5df3ceb7763aa53698542700", 0x3, 0x1}) r5 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='md5sum/eth0vboxnet0vmnet0,posix_acl_access!+lo\x00', 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000240)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x1}, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4(r8, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, &(0x7f0000000140)=0x80, 0x800) 16:55:08 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 16:55:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r2 = socket(0x0, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x1, 0x100) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r4, 0x8983, &(0x7f0000000180)={0x0, 'hsr0\x00', {0x1}, 0x3ff}) r5 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f00000000c0)=0x39e, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r6, 0x0) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000080)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r6}) r7 = accept4(r0, 0x0, 0x0, 0x0) readv(r7, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 696.054955][T26202] Dev loop3: unable to read RDB block 1 [ 696.061182][T26202] loop3: unable to read partition table [ 696.095739][T26202] loop3: partition table beyond EOD, truncated 16:55:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:08 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 696.145987][T26202] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) set_tid_address(&(0x7f0000000000)) [ 696.255049][T26215] Dev loop4: unable to read RDB block 1 [ 696.267429][T26215] loop4: unable to read partition table [ 696.276565][T26215] loop4: partition table beyond EOD, truncated [ 696.282898][T26215] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 16:55:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 696.496765][T26232] Dev loop2: unable to read RDB block 1 [ 696.524840][T26232] loop2: unable to read partition table [ 696.537495][T26232] loop2: partition table beyond EOD, truncated 16:55:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(lrw-camellia-aesni,blake2s-128-x86)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x81000) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 696.590360][T26232] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:55:09 executing program 4 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) [ 696.865374][T26271] FAULT_INJECTION: forcing a failure. [ 696.865374][T26271] name failslab, interval 1, probability 0, space 0, times 0 [ 696.885219][T26264] Dev loop3: unable to read RDB block 1 [ 696.890995][T26264] loop3: unable to read partition table 16:55:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 696.926486][T26264] loop3: partition table beyond EOD, truncated [ 696.947865][T26264] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 696.959712][T26271] CPU: 0 PID: 26271 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 696.968075][T26271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.978140][T26271] Call Trace: [ 696.981450][T26271] dump_stack+0x11d/0x181 [ 696.985791][T26271] should_fail.cold+0xa/0x1a [ 696.990439][T26271] __should_failslab+0xee/0x130 [ 696.995350][T26271] should_failslab+0x9/0x14 [ 696.999858][T26271] __kmalloc+0x53/0x690 [ 697.004037][T26271] ? constant_test_bit+0x12/0x30 [ 697.008988][T26271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.015251][T26271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.022195][T26271] ? strnlen_user+0x1a8/0x220 [ 697.026878][T26271] ? __x64_sys_memfd_create+0xdb/0x370 [ 697.032363][T26271] __x64_sys_memfd_create+0xdb/0x370 [ 697.037676][T26271] do_syscall_64+0xcc/0x370 [ 697.042244][T26271] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 697.048127][T26271] RIP: 0033:0x45a679 [ 697.052111][T26271] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:55:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 697.071752][T26271] RSP: 002b:00007f113fe309f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 697.080145][T26271] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 697.088122][T26271] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 697.096077][T26271] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 697.104049][T26271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f113fe316d4 [ 697.112005][T26271] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 16:55:09 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$sock_netdev_private(r0, 0x89f5, &(0x7f0000000300)="27e1a81867c9e59c1f6fcd84630262dc595ea6b632f0e33266605293d66400fb62dc9bd2c37f87efc8ae5892e86406e2eef537c9b42eee144967ef2051520128363b9ed5145028fcb0461b71fb44f25b2d1789c9895299a43d6efb303c76e3d4ffc22716e2a4968b5b3e3767e5d88973fe4a73f1d5177095b0d4f156826d65240a15fdb67ea40c1ec9500a5c04a466570c65b45d150e55336bc8f5eab34e360d7f0344c48c1e7b81c2f3ce0a3c2f8e4c56bf041b899b7b5318fd768301c1dd2b21a5e1d580a802b52a4444949187c259578a11ad0099a5b79a555f27a02f1ecd04c2") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_START(r7, 0x54a0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x9) 16:55:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:55:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 16:55:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x701240) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) 16:55:09 executing program 4 (fault-call:0 fault-nth:1): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 697.604522][T26308] Dev loop3: unable to read RDB block 1 [ 697.667839][T26322] FAULT_INJECTION: forcing a failure. [ 697.667839][T26322] name failslab, interval 1, probability 0, space 0, times 0 [ 697.675177][T26308] loop3: unable to read partition table [ 697.690192][T26308] loop3: partition table beyond EOD, truncated [ 697.696560][T26322] CPU: 0 PID: 26322 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 697.704905][T26322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.714960][T26322] Call Trace: [ 697.718256][T26322] dump_stack+0x11d/0x181 [ 697.722592][T26322] should_fail.cold+0xa/0x1a [ 697.727195][T26322] __should_failslab+0xee/0x130 [ 697.732054][T26322] should_failslab+0x9/0x14 [ 697.736619][T26322] kmem_cache_alloc+0x29/0x5d0 [ 697.741394][T26322] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.747677][T26322] ? _kstrtoull+0xfc/0x130 [ 697.752102][T26322] ? shmem_destroy_inode+0x70/0x70 [ 697.757231][T26322] shmem_alloc_inode+0x31/0x60 [ 697.761995][T26322] alloc_inode+0x48/0x130 16:55:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$llc_int(r3, 0x10c, 0x4, &(0x7f00000003c0), &(0x7f0000000400)=0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x900c0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) move_pages(r4, 0x4, &(0x7f0000000080)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil], 0x0, &(0x7f00000000c0)=[0x0, 0x0], 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r3, 0x0, 0x21, &(0x7f0000000180), &(0x7f0000000440)=0x2) mmap$usbfs(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20010, 0xffffffffffffffff, 0x9) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-ce\x00'}, 0xe89e9e0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x48000, 0x0) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x23, &(0x7f0000000240), &(0x7f0000000300)=0x4) r6 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x2400) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FICLONE(r6, 0x40049409, r7) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r8 = accept4(r0, 0x0, 0x0, 0x80000) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$RTC_VL_CLR(r10, 0x7014) readv(r8, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 697.766333][T26322] new_inode_pseudo+0x35/0xe0 [ 697.771014][T26322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.774774][T26308] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 697.777259][T26322] new_inode+0x28/0x50 [ 697.777276][T26322] shmem_get_inode+0x85/0x490 [ 697.777292][T26322] ? _raw_spin_unlock+0x4b/0x60 [ 697.777314][T26322] __shmem_file_setup.part.0+0x6f/0x1f0 [ 697.777369][T26322] shmem_file_setup+0x7b/0xa0 [ 697.809316][T26322] __x64_sys_memfd_create+0x20d/0x370 [ 697.814703][T26322] do_syscall_64+0xcc/0x370 [ 697.819306][T26322] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 697.825509][T26322] RIP: 0033:0x45a679 [ 697.829454][T26322] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.849053][T26322] RSP: 002b:00007f113fe309f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 697.857464][T26322] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 697.865532][T26322] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 697.873509][T26322] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 697.881525][T26322] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f113fe316d4 [ 697.889480][T26322] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 16:55:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 16:55:10 executing program 4 (fault-call:0 fault-nth:2): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:55:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80800, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000)=0x8, r2, &(0x7f00000000c0)=0x80, 0xf6b, 0x3) 16:55:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) [ 698.199152][T26344] FAULT_INJECTION: forcing a failure. [ 698.199152][T26344] name failslab, interval 1, probability 0, space 0, times 0 [ 698.255629][T26344] CPU: 0 PID: 26344 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 698.264005][T26344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.274059][T26344] Call Trace: [ 698.277471][T26344] dump_stack+0x11d/0x181 [ 698.281815][T26344] should_fail.cold+0xa/0x1a [ 698.286482][T26344] __should_failslab+0xee/0x130 [ 698.291728][T26344] should_failslab+0x9/0x14 [ 698.296296][T26344] kmem_cache_alloc+0x29/0x5d0 [ 698.301120][T26344] ? __write_once_size+0x5a/0xe0 16:55:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000100), 0x0) 16:55:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 698.306091][T26344] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 698.311985][T26344] __d_alloc+0x52/0x4b0 [ 698.316145][T26344] ? timestamp_truncate+0x11b/0x160 [ 698.321350][T26344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.327594][T26344] d_alloc_pseudo+0x27/0x70 [ 698.332098][T26344] alloc_file_pseudo+0x96/0x1b0 [ 698.336970][T26344] __shmem_file_setup.part.0+0xd4/0x1f0 [ 698.342525][T26344] shmem_file_setup+0x7b/0xa0 [ 698.347366][T26344] __x64_sys_memfd_create+0x20d/0x370 [ 698.352744][T26344] do_syscall_64+0xcc/0x370 [ 698.357290][T26344] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 698.363182][T26344] RIP: 0033:0x45a679 [ 698.367080][T26344] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.386684][T26344] RSP: 002b:00007f113fe309f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 698.395240][T26344] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 16:55:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 698.403240][T26344] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 698.411216][T26344] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 698.419201][T26344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f113fe316d4 [ 698.427244][T26344] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 16:55:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 698.536770][T26358] Dev loop3: unable to read RDB block 1 [ 698.569223][T26358] loop3: unable to read partition table 16:55:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r2, 0x0, 0x0, 0x80800) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 698.630557][T26358] loop3: partition table beyond EOD, truncated [ 698.644805][T26358] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:11 executing program 4 (fault-call:0 fault-nth:3): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 16:55:11 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 698.835204][T26384] FAULT_INJECTION: forcing a failure. [ 698.835204][T26384] name failslab, interval 1, probability 0, space 0, times 0 [ 698.875533][T26384] CPU: 1 PID: 26384 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 698.883927][T26384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.893971][T26384] Call Trace: [ 698.897277][T26384] dump_stack+0x11d/0x181 [ 698.901632][T26384] should_fail.cold+0xa/0x1a [ 698.906225][T26384] __should_failslab+0xee/0x130 [ 698.911221][T26384] should_failslab+0x9/0x14 [ 698.915713][T26384] kmem_cache_alloc+0x29/0x5d0 [ 698.920457][T26384] ? memcg_kmem_put_cache+0x91/0xe0 [ 698.925776][T26384] ? kmem_cache_alloc+0x1f3/0x5d0 [ 698.930843][T26384] __alloc_file+0x4d/0x210 [ 698.935268][T26384] alloc_empty_file+0x8f/0x180 [ 698.940026][T26384] alloc_file+0x4e/0x2b0 [ 698.944252][T26384] ? _raw_spin_unlock+0x4b/0x60 [ 698.949089][T26384] alloc_file_pseudo+0x11c/0x1b0 [ 698.954017][T26384] __shmem_file_setup.part.0+0xd4/0x1f0 [ 698.959586][T26384] shmem_file_setup+0x7b/0xa0 [ 698.964249][T26384] __x64_sys_memfd_create+0x20d/0x370 [ 698.969619][T26384] do_syscall_64+0xcc/0x370 [ 698.974162][T26384] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 698.980481][T26384] RIP: 0033:0x45a679 [ 698.984362][T26384] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.004023][T26384] RSP: 002b:00007f113fe309f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 699.012419][T26384] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 16:55:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 699.020368][T26384] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 699.028319][T26384] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 699.036271][T26384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f113fe316d4 [ 699.044226][T26384] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 16:55:11 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 16:55:11 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 16:55:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 16:55:11 executing program 4 (fault-call:0 fault-nth:4): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:11 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) lsetxattr$security_ima(&(0x7f0000000000)='.\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@v2={0x5, 0x3, 0x6, 0xfffffffe, 0xa1, "c58641f0d8d51e974376c20cb1348255c1a87b9b119b23f2d5f8abb4f98cb551fd408248383487166d236bc2b645b01ae1a5f103653d639e68a42b92de718e9ea035978192de7fa240a7ce6ff778148aac2b33431189d29eb05eff8ffc9031ea3baf1423732318065ac2998e4b95142062abb7f203e6dcc32c7038f70b4d4a3149dc9a9c3629c8ed21935204f52fdd161c8bef26db5a02af019ee918ccc9cccbe7"}, 0xab, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x80000) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x4, 0x0, [{}, {}, {}, {}]}) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x8001, 0x9, 0x5, 0x3, 0x401, 0x8000, 0x7, 0x5, r3}, &(0x7f0000000300)=0x20) [ 699.353034][T26406] FAULT_INJECTION: forcing a failure. [ 699.353034][T26406] name failslab, interval 1, probability 0, space 0, times 0 [ 699.365834][T26406] CPU: 1 PID: 26406 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 699.374159][T26406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.384326][T26406] Call Trace: [ 699.387620][T26406] dump_stack+0x11d/0x181 [ 699.392460][T26406] should_fail.cold+0xa/0x1a [ 699.397060][T26406] __should_failslab+0xee/0x130 [ 699.401900][T26406] should_failslab+0x9/0x14 [ 699.406461][T26406] kmem_cache_alloc+0x29/0x5d0 [ 699.411259][T26406] ? kmem_cache_alloc+0x1f3/0x5d0 [ 699.416262][T26406] ? memcg_kmem_put_cache+0x91/0xe0 [ 699.421485][T26406] security_file_alloc+0x48/0x110 [ 699.426531][T26406] __alloc_file+0xa3/0x210 [ 699.430927][T26406] alloc_empty_file+0x8f/0x180 [ 699.435669][T26406] alloc_file+0x4e/0x2b0 [ 699.439898][T26406] ? _raw_spin_unlock+0x4b/0x60 [ 699.444931][T26406] alloc_file_pseudo+0x11c/0x1b0 [ 699.449890][T26406] __shmem_file_setup.part.0+0xd4/0x1f0 [ 699.455456][T26406] shmem_file_setup+0x7b/0xa0 [ 699.460127][T26406] __x64_sys_memfd_create+0x20d/0x370 [ 699.465547][T26406] do_syscall_64+0xcc/0x370 [ 699.470036][T26406] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 699.475913][T26406] RIP: 0033:0x45a679 [ 699.479959][T26406] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.499992][T26406] RSP: 002b:00007f113fe309f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 699.508479][T26406] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 699.516432][T26406] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 699.524403][T26406] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 699.532386][T26406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f113fe316d4 [ 699.540351][T26406] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 [ 699.597284][T26399] Dev loop2: unable to read RDB block 1 [ 699.602948][T26399] loop2: unable to read partition table [ 699.636939][T26399] loop2: partition table beyond EOD, truncated 16:55:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 16:55:12 executing program 4 (fault-call:0 fault-nth:5): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 699.651555][T26399] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 699.660764][T26410] Dev loop3: unable to read RDB block 1 [ 699.673252][T26410] loop3: unable to read partition table [ 699.694816][T26410] loop3: partition table beyond EOD, truncated [ 699.741398][T26410] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:12 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 699.849659][T26427] FAULT_INJECTION: forcing a failure. [ 699.849659][T26427] name failslab, interval 1, probability 0, space 0, times 0 16:55:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x480040, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001840)={0x10c, 0x0, &(0x7f0000001680)=[@request_death, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000080)={@flat=@weak_handle={0x77682a85, 0xb, 0x1}, @ptr={0x70742a85, 0x1, &(0x7f0000000140)=""/168, 0xa8, 0x1, 0x40}, @ptr={0x70742a85, 0x1, &(0x7f0000000300)=""/187, 0xbb, 0x2, 0xf}}, &(0x7f0000000200)={0x0, 0x18, 0x40}}}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x18, &(0x7f00000013c0)={@fda={0x66646185, 0x1, 0x1, 0x3a}, @fda={0x66646185, 0x3, 0x2, 0x10}, @ptr={0x70742a85, 0x1, &(0x7f00000003c0)=""/4096, 0x1000, 0x0, 0x8}}, &(0x7f0000000240)={0x0, 0x20, 0x40}}}, @increfs, @clear_death, @decrefs, @transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x68, 0x18, &(0x7f00000015c0)={@ptr={0x70742a85, 0x0, &(0x7f0000001440)=""/168, 0xa8, 0x1, 0xc}, @flat=@weak_binder={0x77622a85, 0xa, 0x2}, @ptr={0x70742a85, 0x1, &(0x7f0000001500)=""/133, 0x85, 0x0, 0x2a}}, &(0x7f0000001640)={0x0, 0x28, 0x40}}}], 0x45, 0x0, &(0x7f00000017c0)="93637e82cf2bfb3671c407996248c4a83d1fb28db9c137fed69d435c3c7e243d9f4ce871585dcabf336f2163d1a002ee1c1a2adc0e10739fc5c6c3850ef6428a2c5316c3e8"}) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 699.924792][T26427] CPU: 1 PID: 26427 Comm: syz-executor.4 Not tainted 5.4.0-syzkaller #0 [ 699.933144][T26427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.943196][T26427] Call Trace: [ 699.946566][T26427] dump_stack+0x11d/0x181 [ 699.950919][T26427] should_fail.cold+0xa/0x1a [ 699.955538][T26427] __should_failslab+0xee/0x130 [ 699.960441][T26427] should_failslab+0x9/0x14 [ 699.964961][T26427] __kmalloc+0x53/0x690 [ 699.969127][T26427] ? __read_once_size.constprop.0+0x12/0x20 16:55:12 executing program 2 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 699.975039][T26427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.981321][T26427] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 699.987083][T26427] tomoyo_realpath_from_path+0x83/0x4c0 [ 699.993190][T26427] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 699.998567][T26427] tomoyo_path_perm+0x15d/0x390 [ 700.003417][T26427] tomoyo_path_truncate+0x26/0x40 [ 700.008447][T26427] security_path_truncate+0x9b/0xd0 [ 700.013676][T26427] do_sys_ftruncate+0x27d/0x340 [ 700.018583][T26427] __x64_sys_ftruncate+0x3f/0x50 [ 700.023631][T26427] do_syscall_64+0xcc/0x370 [ 700.028240][T26427] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 700.034143][T26427] RIP: 0033:0x45a647 [ 700.038078][T26427] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.057707][T26427] RSP: 002b:00007f113fe309f8 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 700.066096][T26427] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a647 [ 700.074049][T26427] RDX: 0000000020018110 RSI: 0000000000000380 RDI: 0000000000000004 [ 700.082002][T26427] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 700.090013][T26427] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 700.097966][T26427] R13: 0000000000000004 R14: 00000000004e2d88 R15: 0000000000000003 [ 700.106297][T26427] ERROR: Out of memory at tomoyo_realpath_from_path. [ 700.183701][T26427] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 700.208164][T26427] loop4: partition table partially beyond EOD, truncated [ 700.224640][T26435] FAULT_INJECTION: forcing a failure. [ 700.224640][T26435] name failslab, interval 1, probability 0, space 0, times 0 [ 700.261732][T26427] loop4: p1 start 1 is beyond EOD, truncated [ 700.299997][T26435] CPU: 1 PID: 26435 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 16:55:12 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 700.308350][T26435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.318438][T26435] Call Trace: [ 700.321743][T26435] dump_stack+0x11d/0x181 [ 700.326075][T26435] should_fail.cold+0xa/0x1a [ 700.330877][T26435] __should_failslab+0xee/0x130 [ 700.335738][T26435] should_failslab+0x9/0x14 [ 700.340306][T26435] __kmalloc+0x53/0x690 [ 700.344523][T26435] ? __read_once_size.constprop.0+0x12/0x20 [ 700.350425][T26435] ? constant_test_bit+0x12/0x30 [ 700.355370][T26435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:55:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 700.361612][T26435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.367861][T26435] ? strnlen_user+0x1a8/0x220 [ 700.372534][T26435] ? __x64_sys_memfd_create+0xdb/0x370 [ 700.378002][T26435] __x64_sys_memfd_create+0xdb/0x370 [ 700.383572][T26435] do_syscall_64+0xcc/0x370 [ 700.388084][T26435] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 700.393975][T26435] RIP: 0033:0x45a679 [ 700.397934][T26435] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.417535][T26435] RSP: 002b:00007f7f4ce189f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 700.426014][T26435] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 700.434069][T26435] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 700.442097][T26435] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 700.450163][T26435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4ce196d4 16:55:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000080)={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x1, @local}, 0x20, {0x2, 0x4e21, @multicast1}, 'rose0\x00'}) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 700.458156][T26435] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 [ 700.475629][T26427] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 700.499711][T26427] loop4: p3 size 2 extends beyond EOD, truncated [ 700.518349][T26427] loop4: p4 size 32768 extends beyond EOD, truncated [ 700.525120][T26447] Dev loop3: unable to read RDB block 1 [ 700.534872][T26447] loop3: unable to read partition table [ 700.584087][T26447] loop3: partition table beyond EOD, truncated [ 700.584110][T26427] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 700.614878][T26447] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:13 executing program 2 (fault-call:0 fault-nth:1): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 700.665487][T26427] loop4: p6 size 32768 extends beyond EOD, truncated [ 700.745557][T26465] FAULT_INJECTION: forcing a failure. [ 700.745557][T26465] name failslab, interval 1, probability 0, space 0, times 0 16:55:13 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x130) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:55:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 700.823330][T26465] CPU: 1 PID: 26465 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 700.831689][T26465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.841892][T26465] Call Trace: [ 700.845194][T26465] dump_stack+0x11d/0x181 [ 700.849558][T26465] should_fail.cold+0xa/0x1a [ 700.854156][T26465] __should_failslab+0xee/0x130 [ 700.859022][T26465] should_failslab+0x9/0x14 [ 700.863614][T26465] kmem_cache_alloc+0x29/0x5d0 16:55:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0xfffffffffffffe50}], 0x1) [ 700.868555][T26465] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 700.874816][T26465] ? _kstrtoull+0xfc/0x130 [ 700.879250][T26465] ? shmem_destroy_inode+0x70/0x70 [ 700.884375][T26465] shmem_alloc_inode+0x31/0x60 [ 700.889179][T26465] alloc_inode+0x48/0x130 [ 700.893526][T26465] new_inode_pseudo+0x35/0xe0 [ 700.898223][T26465] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.904470][T26465] new_inode+0x28/0x50 [ 700.908538][T26465] shmem_get_inode+0x85/0x490 [ 700.913217][T26465] ? _raw_spin_unlock+0x4b/0x60 [ 700.918095][T26465] __shmem_file_setup.part.0+0x6f/0x1f0 [ 700.923653][T26465] shmem_file_setup+0x7b/0xa0 [ 700.928338][T26465] __x64_sys_memfd_create+0x20d/0x370 [ 700.933806][T26465] do_syscall_64+0xcc/0x370 [ 700.938294][T26465] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 700.944163][T26465] RIP: 0033:0x45a679 [ 700.948043][T26465] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.967710][T26465] RSP: 002b:00007f7f4ce189f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 700.976220][T26465] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 700.984211][T26465] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 700.992201][T26465] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 701.000192][T26465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4ce196d4 [ 701.008231][T26465] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 16:55:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:55:13 executing program 2 (fault-call:0 fault-nth:2): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 701.202354][T26488] FAULT_INJECTION: forcing a failure. [ 701.202354][T26488] name failslab, interval 1, probability 0, space 0, times 0 16:55:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001e000503ed0080648c6394f20531d20004000f4009001000030000000000009700d0bdff0f0000000000", 0x2e}], 0x1}, 0x0) [ 701.254835][T26488] CPU: 1 PID: 26488 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 701.263203][T26488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.273320][T26488] Call Trace: [ 701.276701][T26488] dump_stack+0x11d/0x181 [ 701.281090][T26488] should_fail.cold+0xa/0x1a [ 701.285857][T26488] __should_failslab+0xee/0x130 [ 701.290792][T26488] should_failslab+0x9/0x14 [ 701.295306][T26488] kmem_cache_alloc+0x29/0x5d0 [ 701.300157][T26488] ? __write_once_size+0x5a/0xe0 [ 701.305157][T26488] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 701.311075][T26488] __d_alloc+0x52/0x4b0 [ 701.315275][T26488] ? timestamp_truncate+0x11b/0x160 [ 701.320528][T26488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.326791][T26488] d_alloc_pseudo+0x27/0x70 [ 701.331331][T26488] alloc_file_pseudo+0x96/0x1b0 [ 701.336273][T26488] __shmem_file_setup.part.0+0xd4/0x1f0 [ 701.341841][T26488] shmem_file_setup+0x7b/0xa0 [ 701.346572][T26488] __x64_sys_memfd_create+0x20d/0x370 16:55:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 701.352059][T26488] do_syscall_64+0xcc/0x370 [ 701.356576][T26488] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 701.362534][T26488] RIP: 0033:0x45a679 [ 701.366452][T26488] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.386163][T26488] RSP: 002b:00007f7f4ce189f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 701.394587][T26488] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 16:55:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 701.402572][T26488] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 701.410563][T26488] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 701.418595][T26488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4ce196d4 [ 701.426573][T26488] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 [ 701.498842][T26496] Dev loop3: unable to read RDB block 1 [ 701.515792][T26500] netlink: 'syz-executor.5': attribute type 16 has an invalid length. [ 701.531301][T26496] loop3: unable to read partition table [ 701.537208][T26500] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 701.564618][T26496] loop3: partition table beyond EOD, truncated [ 701.575119][T26487] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 701.580382][T26487] loop4: partition table partially beyond EOD, truncated [ 701.622608][T26496] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 701.644948][T26487] loop4: p1 start 1 is beyond EOD, truncated 16:55:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000100)="2e0000002d00050ad25a80648c6356c10424fc001000000a0a000400030082c1b0acea8b090001800402170fd1bd", 0x2e}], 0x1}, 0x0) [ 701.681742][T26487] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:55:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$l2tp(0x18, 0x1, 0x1) sendto(r1, &(0x7f0000000140)="4e75b14bb60b72677f3a2fd9f07beea9b470b7f02ba9087f22fb0a198250d9efaa8acd81fae6424c8508174e619f9b745101e9e837878adb034a389c55abd9fa1554ce89164ced579ade23b1aff017e91706e5cf2d42177b9d0ca08f45e06638c3e85ada88b45c8f0e6398c33203d3da037b302de5c5372d8b460f032d410b2b33282881a13e096da4df3779301d7c8d5c18c8dbb9e5aef4d435f33f0d94a6f3354db7664805e18f05e8f8cf37ea736f6254248261152183a2d7", 0xba, 0xce36db4b5ed1ff62, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @empty}, 0x1, 0x0, 0x3, 0x3}}, 0x80) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 701.725387][T26487] loop4: p3 size 2 extends beyond EOD, truncated [ 701.760793][T26487] loop4: p4 size 32768 extends beyond EOD, truncated [ 701.777122][T26487] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 701.787532][T26487] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:14 executing program 4: syz_read_part_table(0x2, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:14 executing program 2 (fault-call:0 fault-nth:3): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:55:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) geteuid() ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x10201, 0x1, 0x4000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) 16:55:14 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc000c00044002000000053582c137153e370300000001f01700d1bd", 0x2e}], 0x1}, 0x0) [ 702.206206][T26543] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 702.228939][T26543] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 702.243679][T26535] Dev loop3: unable to read RDB block 1 [ 702.254176][T26535] loop3: unable to read partition table 16:55:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 702.294013][T26535] loop3: partition table beyond EOD, truncated [ 702.303431][T26535] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:14 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc000c00044002000000053582c137153e370300000001f01700d1bd", 0x2e}], 0x1}, 0x0) 16:55:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80180, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r4) setresgid(0x0, 0x0, r4) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r5) setresgid(0x0, 0x0, r5) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r6) setresgid(0x0, 0x0, r6) getgroups(0x9, &(0x7f0000000180)=[0x0, r4, r5, 0xee01, 0xee01, 0xffffffffffffffff, r6, 0xffffffffffffffff, 0xee00]) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x100000, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r9}}]}}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r10 = accept4(r0, 0x0, 0x0, 0x0) readv(r10, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 16:55:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 702.580568][T26562] FAULT_INJECTION: forcing a failure. [ 702.580568][T26562] name failslab, interval 1, probability 0, space 0, times 0 [ 702.605235][T26548] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 702.613849][T26548] loop4: partition table partially beyond EOD, truncated [ 702.636646][T26548] loop4: p1 start 1 is beyond EOD, truncated [ 702.642173][T26564] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 702.651643][T26562] CPU: 1 PID: 26562 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 702.658423][T26564] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 702.660005][T26562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.660011][T26562] Call Trace: [ 702.660040][T26562] dump_stack+0x11d/0x181 [ 702.660105][T26562] should_fail.cold+0xa/0x1a [ 702.691629][T26562] __should_failslab+0xee/0x130 [ 702.696485][T26562] should_failslab+0x9/0x14 [ 702.700990][T26562] kmem_cache_alloc+0x29/0x5d0 [ 702.705753][T26562] ? memcg_kmem_put_cache+0x91/0xe0 [ 702.706932][T26548] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 702.710957][T26562] ? kmem_cache_alloc+0x1f3/0x5d0 [ 702.710981][T26562] __alloc_file+0x4d/0x210 [ 702.727509][T26562] alloc_empty_file+0x8f/0x180 [ 702.732273][T26562] alloc_file+0x4e/0x2b0 [ 702.736522][T26562] ? _raw_spin_unlock+0x4b/0x60 [ 702.741379][T26562] alloc_file_pseudo+0x11c/0x1b0 [ 702.746425][T26562] __shmem_file_setup.part.0+0xd4/0x1f0 [ 702.751989][T26562] shmem_file_setup+0x7b/0xa0 [ 702.756667][T26562] __x64_sys_memfd_create+0x20d/0x370 [ 702.762048][T26562] do_syscall_64+0xcc/0x370 [ 702.766621][T26562] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 702.772515][T26562] RIP: 0033:0x45a679 [ 702.776464][T26562] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.781842][T26548] loop4: p3 size 2 extends beyond EOD, truncated [ 702.796064][T26562] RSP: 002b:00007f7f4ce189f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 702.796082][T26562] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 702.796164][T26562] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 702.796237][T26562] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 702.804191][T26548] loop4: p4 size 32768 extends beyond EOD, truncated [ 702.810938][T26562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4ce196d4 [ 702.811012][T26562] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 [ 702.905748][T26548] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 702.917214][T26570] Dev loop3: unable to read RDB block 1 [ 702.928415][T26570] loop3: unable to read partition table [ 702.944789][T26570] loop3: partition table beyond EOD, truncated [ 702.959154][T26548] loop4: p6 size 32768 extends beyond EOD, truncated [ 702.959259][T26570] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:15 executing program 4: syz_read_part_table(0x3, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) r4 = openat$cgroup(r3, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x40, 0x8, 0x1, 0x52, 0x0, 0x9, 0x4956, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x10001, 0x7}, 0x4000, 0x200, 0x8001, 0x8, 0x7, 0x6, 0x7f}, r4, 0x1, 0xffffffffffffffff, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa}, r5, 0x0, 0xffffffffffffffff, 0x8) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x0, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYRES64, @ANYRES16, @ANYPTR, @ANYBLOB="fc2dffe80a90f3c86a1c11c471f9426be683b7486be64df69a82490d1083b5469d9dddfb37b6b58c5e05b84131490655a85b3fde77089313867ddb0a3c8fd592f7c34854da83b39b00f76ec8bfab272a8a7c84ec05056350ea0ff3d76e6ff86cc8c752bfc435d91d03768696d0e40f4e0d3a637ced0ac1f1555a02", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r6]], 0x95) openat$cgroup(r5, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) close(0xffffffffffffffff) ioctl$TUNSETLINK(r7, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='nr0\x01\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) 16:55:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WIE_OFF(r2, 0x7010) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:15 executing program 2 (fault-call:0 fault-nth:4): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 703.299052][T26597] FAULT_INJECTION: forcing a failure. [ 703.299052][T26597] name failslab, interval 1, probability 0, space 0, times 0 [ 703.344773][T26597] CPU: 0 PID: 26597 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 703.353134][T26597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.363199][T26597] Call Trace: [ 703.366511][T26597] dump_stack+0x11d/0x181 [ 703.370848][T26597] should_fail.cold+0xa/0x1a [ 703.375613][T26597] __should_failslab+0xee/0x130 [ 703.380546][T26597] should_failslab+0x9/0x14 [ 703.385058][T26597] kmem_cache_alloc+0x29/0x5d0 [ 703.389850][T26597] ? kmem_cache_alloc+0x1f3/0x5d0 [ 703.394896][T26597] ? memcg_kmem_put_cache+0x91/0xe0 [ 703.400144][T26597] security_file_alloc+0x48/0x110 [ 703.405211][T26597] __alloc_file+0xa3/0x210 [ 703.409659][T26597] alloc_empty_file+0x8f/0x180 [ 703.414432][T26597] alloc_file+0x4e/0x2b0 [ 703.418711][T26597] ? _raw_spin_unlock+0x4b/0x60 [ 703.423568][T26597] alloc_file_pseudo+0x11c/0x1b0 [ 703.428521][T26597] __shmem_file_setup.part.0+0xd4/0x1f0 [ 703.434116][T26597] shmem_file_setup+0x7b/0xa0 [ 703.438799][T26597] __x64_sys_memfd_create+0x20d/0x370 [ 703.444217][T26597] do_syscall_64+0xcc/0x370 [ 703.448748][T26597] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 703.454643][T26597] RIP: 0033:0x45a679 [ 703.458555][T26597] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.478186][T26597] RSP: 002b:00007f7f4ce189f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 703.486609][T26597] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 16:55:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000080), 0xce) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r5, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x200, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x5}, 0x0, 0x0, &(0x7f0000000240)={0x4, 0x0, 0x6a4, 0xd85d}, &(0x7f0000000300)=0x8000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r7, 0x0, 0x1, &(0x7f0000000480)='\x00', 0x0}, 0x30) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) fcntl$getownex(r9, 0x10, &(0x7f00000005c0)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r10, r3, 0x0, 0x126, &(0x7f0000000540)='\x9e\x00sh\x00\xef2\xc0z\x9cR\b\x00\x00\x00\xe6tA\xea\xa8\xab\x8a\xe9 \xd6\'\xc2NY\x1dT\xf0\xd4-q\x99\xd7\xceG\xc0O\x04\xbf\xdb\x9d\xa4\x94\x13\xb3;\v\x01L\x84bh\xed\x13\x87lq\xa06:\x059Z\xd5\x8a\x8e\xbe\xbf\xac \x86\x8e\x97f', r8}, 0x13e) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r11, 0x3, &(0x7f0000000100)=""/53) pipe2(&(0x7f0000000040), 0x0) write$P9_RREMOVE(r3, &(0x7f0000000000)={0xfffffffffffffd40, 0x7b, 0x2}, 0x342) 16:55:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 703.494597][T26597] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 703.502584][T26597] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 703.510564][T26597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f4ce196d4 [ 703.518555][T26597] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 [ 703.535868][T26594] device nr0 entered promiscuous mode 16:55:16 executing program 2 (fault-call:0 fault-nth:5): syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 703.606487][T26600] Dev loop3: unable to read RDB block 1 [ 703.612424][T26600] loop3: unable to read partition table [ 703.632789][T26600] loop3: partition table beyond EOD, truncated [ 703.642112][T26600] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 703.757257][T26602] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 703.765898][T26617] FAULT_INJECTION: forcing a failure. [ 703.765898][T26617] name failslab, interval 1, probability 0, space 0, times 0 [ 703.770967][T26602] loop4: partition table partially beyond EOD, truncated [ 703.790178][T26602] loop4: p1 start 1 is beyond EOD, truncated [ 703.796564][T26602] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 703.804807][T26617] CPU: 1 PID: 26617 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 703.813153][T26617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.823214][T26617] Call Trace: [ 703.826520][T26617] dump_stack+0x11d/0x181 [ 703.831819][T26618] device nr0 entered promiscuous mode [ 703.840065][T26617] should_fail.cold+0xa/0x1a [ 703.840104][T26617] __should_failslab+0xee/0x130 [ 703.855811][T26617] should_failslab+0x9/0x14 [ 703.860829][T26617] __kmalloc+0x53/0x690 [ 703.865008][T26617] ? __read_once_size.constprop.0+0x12/0x20 [ 703.870937][T26617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.877223][T26617] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 703.883099][T26617] tomoyo_realpath_from_path+0x83/0x4c0 [ 703.888660][T26617] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 703.889543][T26602] loop4: p3 size 2 extends beyond EOD, truncated [ 703.894072][T26617] tomoyo_path_perm+0x15d/0x390 [ 703.894113][T26617] tomoyo_path_truncate+0x26/0x40 [ 703.901111][T26602] loop4: p4 size 32768 extends beyond EOD, truncated [ 703.905253][T26617] security_path_truncate+0x9b/0xd0 [ 703.905275][T26617] do_sys_ftruncate+0x27d/0x340 [ 703.905366][T26617] __x64_sys_ftruncate+0x3f/0x50 [ 703.905468][T26617] do_syscall_64+0xcc/0x370 [ 703.911891][T26602] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 703.917074][T26617] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 703.917129][T26617] RIP: 0033:0x45a647 [ 703.923622][T26602] loop4: p6 size 32768 extends beyond EOD, truncated [ 703.927184][T26617] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.927259][T26617] RSP: 002b:00007f7f4ce189f8 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 703.988336][T26617] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a647 [ 703.996336][T26617] RDX: 0000000020018110 RSI: 0000000000000380 RDI: 0000000000000004 16:55:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x22455d1f3c25bcb9) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0500000000000000c302000000000000ff000100000000000000300800"/48]) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) r2 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x4, 0x41) readv(r2, &(0x7f0000000340), 0x0) 16:55:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 704.004302][T26617] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 704.012281][T26617] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 704.020286][T26617] R13: 0000000000000004 R14: 00000000004e2d88 R15: 0000000000000003 [ 704.038379][T26617] ERROR: Out of memory at tomoyo_realpath_from_path. 16:55:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 704.275356][T26617] loop2: p1 < > p2 p3 < p5 p6 > p4 16:55:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) [ 704.305132][T26617] loop2: partition table partially beyond EOD, truncated [ 704.354229][T26617] loop2: p1 start 1 is beyond EOD, truncated [ 704.388259][T26634] Dev loop3: unable to read RDB block 1 16:55:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) r4 = openat$cgroup(r3, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x40, 0x8, 0x1, 0x52, 0x0, 0x9, 0x4956, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x10001, 0x7}, 0x4000, 0x200, 0x8001, 0x8, 0x7, 0x6, 0x7f}, r4, 0x1, 0xffffffffffffffff, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa}, r5, 0x0, 0xffffffffffffffff, 0x8) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x0, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYRES64, @ANYRES16, @ANYPTR, @ANYBLOB="fc2dffe80a90f3c86a1c11c471f9426be683b7486be64df69a82490d1083b5469d9dddfb37b6b58c5e05b84131490655a85b3fde77089313867ddb0a3c8fd592f7c34854da83b39b00f76ec8bfab272a8a7c84ec05056350ea0ff3d76e6ff86cc8c752bfc435d91d03768696d0e40f4e0d3a637ced0ac1f1555a02", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r6]], 0x95) openat$cgroup(r5, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) close(0xffffffffffffffff) ioctl$TUNSETLINK(r7, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='nr0\x01\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) 16:55:16 executing program 4: syz_read_part_table(0x4, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000002480)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x1ff, @mcast2, 0xaa}, 0x1c, &(0x7f0000002400)=[{&(0x7f0000000140)="e7bd32760f58e845cd532c1d1f0d336bc7c473c6f6c26cc7af3d8f6ff85f68225bceaa68210c4c03c1145e2b4020402460cde92e0c22d6de856b88f9a1c10090a5", 0x41}, {&(0x7f0000000300)="e4b9b3328131179ddc73f4c26c80de92704f6908a1de516fa44ee54891ae90f86bc584511714381880655181d9356ed91d940975e7038f2c70ba43cdaecfa1398069a37fd535904aa9ca6fe493f4454b5b946d07e3ad859cd6158ca86c4da8c341c235fe272add545bd5af162549165cb1400e440a6b6c7d84a6f460723577850a4213f65bb50e806eb02b958afb2e8e5785603a6e7739c19624a15e476e73c6e152ff4c5bbe7cab0a61977e2637ee1a2789f82c8f9cb11952992d56a0764a692f8529bf748dc7187c59dce1d692c4ad5c477b8cb8341c81631dafb410240fb2e6b74604d7e9e311cee519918474c076d35fb80f", 0xf4}, {&(0x7f0000000400)="038d8788bb57b191a2735889e892b51bd2d4d16c5a2fcfa448e93e17a0b26cf7c8adf31adbf11ad8efb60bac2e653f784d81a50fbf2ea7e5098308756d7e2d4a7d98ecb5bdde58613c804a05b8773caa5f3c5a38b1b0778d5d679a68a4a7b5b359d1441b8eef7fe745b7b8abd12ee2c8ba79c356d692066c368da8d87e09e4d09b02fd99473016832118ae2a3f46d8ff93a8ddc2533cc0418d45f7aa7235b12fbbd49bcadcba897161c059c39d71a77c10564476c8b725c13bb06d287e02f9f4132ef11a1f1fd7753dcbc41ec2a84f7f4757867694ef56fa0b0bd7789d6a88380b4cd16d3fe8612b5b46a945adcef8cdf34f7e417a586337ae51249e69f2eaa5de066ded35d0135b725a35baa0a35cfc43105c0fd4b6413b221be125bad0b69ccf01931254176146b3a0d284e5f3de8917d5e15ee2a064e0ceb122d25c6bf4ae71adeac76b8ed80f0716cf0b3781dc598b9dd811168bc7876e5e57298a2300354b203debde1cda6c72161acdead5be5290cdc506880ece11579520c14daf7f516d095e0be88523fed7fb12faef9341fc5100537f737c9eefa0b621231242d6056f4decab7122ddfac1f7e97680a8c5fcd985437f5ed1ffd5cdf62d60a64bf7445226e2ede31560e802fee66c4fa9e04d4fe8de083f693534277dda09282d15cd03ee4ce6e9ca67db054d1ecdd4537909a6bc7766f83a16ef82e0a6e3b32508b96317f0dc89e8cc2918015171fa286e95b0409deb146cbe2d82fb53614a3c54764fdc3eb3af4a01aa6ba744a1994798ce1929dd74e8e7db0ea3fa1b5e3c19105fed3484956f07b017c686f827a9454f067d57c77b4cdf4e4ee266cfde0e41e7e0e612269468c71c6afbc7e73fbb403fd3091c8d971aadc02256b12dba7f56cd870083e8a1f7a2e6bdc862424f278c28cdd212181e398f6a2c82e0717f781ddebf943eb6115dcbdeda70ebbbda9b4eec3541ca869d5ce8af3a625c5f8d1e365b1ecd1da1d26fddb8458c85a1fe8e8914b1be167db980e9829675abd6647633797b504d81253856ed574dd5a81a50012ca975e0b09f23a90bf421fcf89102868335dd4287542182ac78afdca344555ba1190fa88eb894afa908da8629d074f31c81c3a15abd0aece1fbf9471a15099abb9ccdd553d3a206440cb64220e20b2280a41bea971d5d4a1237544c40c82c35e603ae6b76feeed23e5f68eb24611993eb2e0cea44fc4b5f3ac0a917216f826a3e2bf14322fb4baa033f85ddeca21071dd0ed49d2fe2af7cf474c3283513ae5edfe45ce2e1ca425c83b56fea359ebb1b3a997abdda84ac129f724351eba8015576695d6d4fcc9c25534c39c71446fe9b8438567fb564b9365522517c294963dd88ebec932429e03def10daad47efae0eda81ba1c21653ea3e8599287a5c6f7b830cb7ca4ccf4a2d6458e0d6ff9ba5d26069cf6618b21c201a4cdeb0b737939c8825cbb21c1e5252057796edd3c4a8f4ca0f33ff29571cdf497ab06c0f2797954416c69a2aa9a2640200879d45042431f67bf8a1abc3c9e09e24959d510f435852b276193518f5773399517fb2ff4ed35ee491b9f4700e7bbfc5760ba5d1e8a88299b6eaad658680a8dbdbcfd796cabd6e18d0730f6d1464c556ee6ca7f85eaa940f637b11118c98b8a986fde86722cbfbecd19e17851d2f273493b6712dfe30a22b8f042382763fa6181d81230fae9e9355d7c8401b894b98f4f132107d0873d6e8d54e416cf127a59acd37e37a8a03064896ed4341cccc7fbb7731cfc6e7bd7dcad94d33b5bf5a9d06b3a03071ee3d677c40932b52ac080b1b679c8499408495b48667dfee70a723c06294b9991af95e7507a5cf330c2de65e4ff10dccbd3a4fe5e0abcab155b4f8b0d57dd2468adf3d091b9ebc7e2f014976ede21efa04470c8dc9f3bbadfe6a9fe03465266137bb8ba0869e8e8721203ece971bb3f854f8f4efdf2a957dbaf90c3d6dd8a8ad112a609ed3dc868e1454a068704d61282066772ae635b0399d78b580bb007ac8aa86a4d5be1cece6e62dcc2dfe4afa7b3a713c26c3890df67231051dc3560c92b72ce382fa3353e84869ebb0a99fa81b365281426a09e7f4c6297f9142d00c41841644b422a83c6c64b07ef1cd40891e6078015c06b509f76794f7d6ba2a8bab88ab670576a6f58e86d941b13bc26ab0973593fd43159fe524f14cdeb7d8e0f47308c81b2c71be2b81e60948d835295fc6e3880d3e39e86d46eb2ee409146008bd9ae25b97b2b22e9b943a91d95fda31c20ddbe4c3686e069b936a2a4ddd7db4cc74a0cbf3e2b5d7ce08b76ea0fbacba0dbfd1575292acd0d93697d5bc7ae06cfd2f0838eef871a25d0473cca96d00303265312738fe7638f2165527f5b551955a26e27fdc91f98a1a3b9d5b2e0c0fbe210d391aeef325e26e29b71d9db14a395e9955ddd0c8091c7221f68b196927e53b49c69a7d9798ea68e135b780712662d8946b51c56976fc698b705dfdeac85aec1825a83f43c9b8f51d69f5efb5b7bbea5c54d2ea1e4a17168ed98b9d2b4879ec2ac6f6199a396bbe2ce15f425ed2095f3a8b6bb583311930cdf64e00d845f96859e1ad696deebf433770c670bbafb352cd3c1efa717bb539b6a69615c8eb57c62b55cba8db687179289aee4209c1b86f298a2c87febb0a1ea6aec1c6d266ce4962392733c3d1367ee1d91a036a84c7a35c24e90d21d5b90ebf94d7c6ca379d973d14f8d4b9b9d76755b5494a7bb39b0f6f6e5cc5f56ca53a3b8d431a14af55dc56a4ac63883ff7f4ba2bd1c0446d3779bcadcfb97d7a5702ace85e3951b9af32437934f87635c4058e5f6463c206491fabd89a76f425ad3f0949a604f1a956c95fcf519785a304651f0c2b5e68b372d190edd3c52c3abfe6b13b5840ea30f22d2683286bf814bc581b9cace199ce0fa6cfbdc1296d7271d5a9ed9aeeea7a086bd08cf5659d87f742a05f391e1d19da0fbd1e1455a5ca436fc2294e1709da102b541932d40468d34a219d50b0a17463f32d20cc72ae59ef5abae9c6b0acca68ee0326dd4217e3effb5b7566aaa7c6e9c7018d55a8e1ff631c882aa15f2cba5bbb2b696312e59f1ca42da39dfc36c2e5388998acab96d8456b91f79e9914bd8598db5431b523fc0838a455db1097c96bca8d22989f296ffe00ac28ccdd7cfe7af74b140062564e439daa72a4c919bea6ce4a7c683d7a2892d8794b08d163f248be50d31188ed3d17c394314f6b6697037dbbcf9be3911fcd40027a2a376e26d4701abbdcd6eb0e98d9added9098b238f8b82f463e0650486de5ea6b606198f09496d6a2b58b247db530b617e1c155d42acc732426eec99e172c2fe5d23d667f5e235654d581f6ecf50c9b81903deb5c46c703703511e2b7f6213bd2a8bf91b509eca233a56ac0a181c3c1a2c1592b619a3796edc60733114ade199863ef0913f33a8bee6c38791429a9d5eab5cfee01d18e74a53e48eaac8c34ac3b966e78e89108e4531881408417df68039986acd2cbf2307dc20702e0aaee7661cad875612cdf3b4566c605feeefd9c62c275234a1c72c341122381f5d032282496f00b755e3d3334111e7418ff88dc2857484ff01b82cbd9906e582674350d75b540abc735a12583324239904876be43a7ea4a590911dda654a41421135c1fc082ab32a65d304b7fcda26391a053db30a781c529eb521f7d12f7e6f76e4acb1666fb56c26926c28d9d811f0ff008eee5cc5e7494996d0092a6982cf45709c21f8f334d0e2eaef9892fb65ca739b0eb09eb44a08c2204c8b4c97d91ddfb209c709168fab21fa206ed479e86a73b50d2aa79348caa0fc51cd049c9ddb0104b3eb65b5371f1b71322a1e584d61e4ea609b746aeb5b71b6315ab7efd203530c67bd40e662d3ab2fd5f049e414602956144e10c474611d244b595d486bc37c671a8b1558e1adffcd208f4706c144b38ab6c07e7021f5efdf8c8feee7ea3cbd21e01c5baa321a97ed0c5e72bcf2edcb1b992be7e32d7686f08cbaf75c8421a9b0a038b1a77d1f9ceba51e4ccb9894dfbbb866c521e969f8a04f6ce566f2b901835036946e7a6510ff883370ce5c96231b25ec1cdcf6b8d9d262081c6ae7df31018ab925baeccbb96442ace015782ba8e35f753b8426c45c65ef438907fffca8d241c4c6a84353422f8a67e40eefb470eb2387e31e63d257f93c72ddc103d9ed46b35a5e8e0b4eace6519f2523fb5d3bdaccccef347b0b7b8ba8357b3c83ccd408a78b177d763bea4bd97bb163e9fa2f9f2683d2e39c8c77249ea250bd25290e1affaa8d0165b3a4c5d3321ce4e9ae5e09b5b5d814490ec6e7078463d5a18a17fe4e702765febb066e24ce0802e03bbaa3a229b4b6676ec9bae4e88ee2eafd9ca271b5d97f3930448ab4d32767bc63017386dc6013ec1ee6b91fb64074daf5a7f23df1d5d5d93f5dcbe3907edcb882a19f45e5bb195d7c1d3dad113a6650c3d983e2713027897a12fc3aa52c3ff3fc56ace5b527ca608d5cd74ea7f7215789616aef57afeebe9c97612dec2daf311a01d6954c3ce30ae20864276b87626e66992d9c89e7987a8a74b412064aefb202ea6c35001045d754d57cff7c08a7f340ddc7fcc5c024055df66b244b30e106f767d2c9364f5176486c26c716138a81c9ac39662faa628ece769783731c4927a8de0b45a73dc5cc16aff682e7deaabfeaa311e52b7b1f23547ff90125ecb13796747889c2db12b1706147c8ecadea1633481260f300179a129e9fbb2edc93530453b0f0927a5dd056549fe4022b832b28da1bfeac3541b1ebdc174856bd01c99e705eb2bc71f7cbb91eda4bd278690975a491bba18ffd23f569299c1fde3d541bdf72bfda546d9e106a9fb721f1b0519dbd06d5a76c94d9fd7901f58b639fb6273519d1a4898958a74cd6de13532068429d520d29aab7582bd180a7a829e3f89171cf09b966ee51545cd6bc2e7132bef30465155acb0d0190b91829df8170d39c242d4d2849f6e861c3d5bebd4330ddafd9a9a79fee82b4c877e69ebb24f33f02a4cfb1494e0e44e6b7b31a5134201304ef81659425391478fcf195a80bca07ebb57feed46fe61aaee0283e8c62608e1b9f1c03a130515e9bcc4ab37a4087d445c26ea643d6aca401373d320bebf1cc612f535b7d93e001852c37d1f0f7052189329fd1d6b07e5088c2e39bbc2c5e9be18cbeceea1260b2c227339853d568a4b42956bb7067f75bfda04e021b02c93af0ce512889499d9de2ab2f72ee89be23531143e345bb58b3b0b688b846003e855e29731ba78a52b8a66320775ce01ba319d1e347c843083365597ea1e21e7aa7c215643049e0f0586450877be85e753f159ffa2a4d152b8a6e67f7c020f0d90a35070384ed16f8837fd2f1c1dc5c844adf866ef5d482f964bd3c9f42261d8369d8204159a8d1b888b99ac9c95530f622fd71149175e9fc8df9f5ec7d9e500f0ad5b3b235bef87534111a14636f6d7967f5fe685242f2b699bac29360c6f4d251707f388e40b6656b2aa8caa05e45039a9a7c64fa99436ff6b18baf1fa0aba6efd4ab27bb4cf5e3d2c071d419886d63f5006a1671a9fcc3e11409e010363dfbabecd68a59bb87f209ea8d5b6cdebe55cd9ea1bee3a2d729f3f2729f219e71b4e6fd7f1fe018977d349fd7feef7557d9dcf5bcec2f8daf461bc770bef2ffb5f98157ab8d94c7b576fd9c9ee59e801f72868744c53e94b77f00c30407a97da8b012fc2c759186e1ff18f3606d8323b0b7004f5ed8b80e767fafc056b105150cc", 0x1000}, {&(0x7f00000001c0)="19388a09bdb15463dd4477c0a0624db973a0ab097231ce59056f83a97ffe92762966f5c72fb9d47122fbc0f1f339b3f02f0da8fa5e0e707f6c8c1b6904b2931af95f840d5a77f0191614e85ca33d506403071cc5efb4c12ddb32be47e68187a2bd2092fc267d8f3b311572b6aa382a54499fc2b231092b2f8b0508bf8fb7f841c6db7b", 0x83}, {&(0x7f0000001400)="fad6ecd6a60be02317e4b7cde20683bf33117cf6758c07ab6ece1fd3c7792e8af103a44801893a34e199d40f6a096e7f6078373ab1bd3e3bb59b48bc631ee5218330b0902d8686aadaaae670dfcbf0164adea910091495a6344d87d5e78324561bbe276f6333bcc1334300fbb5cef95bfcf8c28b38362361529b26a7032613f1612f0de0df520afdea8db795bdba8df307ec4efc655e6a1d84a3fd783eba0ff976d6d1c4f56bfd71589218cd374780d59f53ed240bcd82978923287edf1883950b9f9b8a51e4aeb2aafa0957a7b3a4a64bba0e3876c19240bf547a9d94384d7a4e6eca7086cda9165899ecd47e32c5051ded020bfb72a757946578a48f4906721acc76c2fcdf560e16dfc7eb0ba6894f63240cf946f331f82a0a6d9bd8495c3569c0bc81dbc5c6b153351ec967fe789aa2abf59e53bcf8377e931489dfc8469b877db9cfc188fc8e415703625c305df7622232b3f30c404478435082295eec8ebe209577fbef716e90503cc2035a22647d44b141567f812c98254102852ca142587ce7bae0b6d3f3bc215d1e81f888d0696c1f3ddc3eea1f78a3660410142a66bcf54536fe5c87d392d1f7e7c3b6ab1b29b751699e806c2c3320ec313c5639100ca62c2060163e868c77afa96546127f9b77b0ecda1d311c35c33393606465f80928fe85f81723e0f932f526a6076a1cd454dd4d1a05cc3c8d81ffe19cadeb9a773fe9c2fcefac5a47c373209fee5777f18659912b0091ea290f3f4bf8661e79697938f455e931815d2e118a60c8fe1e6244f27ac9c2464e541055b1c68e7b07d5d4c16755fdf5228cc733d63c11d171ca1282c28f5040f5d008337e8211e758cd4ef9d9bfd42f57292f103288ac1e1fa03a170a03039bdf3db023033b32e41367228db3ca90b363c56d34ab0bf3ab01ba8fb698771ef1898e05ddc13d67190b0019fd4cc362e9c5ca5e1345cf012b754466054f4a9302bc2019a6de6ae70cc7da5027b59c5a429f70341ca1ff36b13608cf31655683779121b21eb3d0783873afa8578f3fe41b1ca9ec59f04eed586ce4582464e46334a783f7aa33e1b501e1f3a519d2b9177725cfa54f37291d838bee6564f4907f86367e70425238228363168d11aa76dab23ce43266e7fe9c0c693478b2aeb5e829f0d6d7cba6c3ae434d8c2cb5794873d99ee740e5d3e48c9499f5d8dfbddafd558988046cc3204383ec3e40d47fa1e55f57d497f33e250b614a7cd9473fcdf0cc5a6196cbe97ce5e188e05cbcf3cfcab5ee155c798b02b3cc87bf5cc1e16fc3c832f7d9f71474518e327f745f772174ad33e091673af19b5e7b2e33cdf15903a761081ae03ca4bb90e996d9dd013fbb02930c5cdbaa388d4c8a0c8c917d341e86dac4b236a1cda1790ab2ef89121b2a7634b27fd1a0ab5849a1e0cee534cd2a0493bf0ff06904785415622a8e22c16b36c7787ade6dea8dd12a99450eb7532544aa45bbd78c8e632d90321a85c40acf0512ad2e1aa7994aa21edac67aebc8a7f6e8ff17c5c74b6495169233fdaac5d8c82323cbfe72ae2dcb17a16a7ad07f15b06620e7228281d0260bd8de9bdcac87589d4cfb240bb177ba757297d2007f33cf886713e3eba54485cbc4b5ce9d28fe72298873212cb17a0344cdd3d785b5161909ff6a0d3f1a7ebba25b81c417df64e654fa2ab0332546c358450237eec861697d3b1310e94cd8f32bc9270c8dc5895bd090194d68e8c3db3024ade3e105da9b3f44306016dc1da1b3ac9a3f5c0ee7814b48f95d419479a33499698801300db3053990400e07c46449bbde1aa896b7efcff2d355c06b30ee987b6879d9b6c42757e01f594955f654ac7bc0faab1295c5b4df615dd6c240993560647fdb48826027c4cbe1ea20d1be51c73256b9d0e4c39fd5580713b5a4d07a6fb797e10efa804c1bcdffdf28af0ebebdba3c34e8f63a7f0b701f4c9f055c14703dd32c5b32bdd70e8f4d5c2e35dbd102834248da326fb4bbcefae188b2aeb9437663848552ee48015419e4dbf5c79071824c1ff98eb5004ae43ef1cbae17b17b3a3e9f1434ee6e5966eed077a93202991a81d8d328b83e152e5236f5ad2370051167d97e92e4bd675c02ca4dca4bbb8de0a0b3abbac9b09bbdbc62caa9a460106e7baf20d6197825400ed29322ab22a8f8e1a975de409397a0cb32a9663f927c89cf74ac3d18f7ead210fa7cfb1984725969b894b85734b4bbc992d7a18161380c3d2eca99708a6615032a773b4a4c25ea769b05beb713a7966c8c4269729e20ac6623e4d57883afc6c20c8c09b933a4fdda584d45c1f8c7f93be96cf9d9a803cc728f5a2ca17f3be2fcadafcc958e2ef601defb61446a052836e7a7d154b5987c6f0befd11b6fcb809546461dc941ec4021295d4e761113ffc6c812a60c69faec53cb34a9f4d5e86d66bfc2f2baf0901717eb276cd23b6a7e729f48311ea59a6b1b010ca3b12052f81af87b7a78e825d3ae90d7f0bc6d308888b444510e188e646656c9c4c4c81aa9fdd7e0864c00e2d4855a14062b13a3d6743318577bf124dfe7aa0bdf5b7ca7a88a170b9d9109ba891795fd070ea910383bf9be572c3e31563a6f9330f89b6514d2a6b078552efb78694c164be4b984c45797a31a6fe3b5aeeba7a8b9c4f0a4e7a47450a6b32e7c3b55fcdad3a46a5604872d3c7aa2359b1ed6901c759ca218214391e0c1a55468fd7884251fe180e199b9beee4902f6f2aed249615c880936e71257b865231be8ee363fefb370f0c7d3944aeb179738f884222f24dd9b91df13dfef772165ca2437203bc16f29004507b905c41e062b2d6343721ee444e0cab8dba0d523032128dcb4f6347c576cee4ddaa2aa2a34bb5e895734e2c639bdc14a6d63a90ce17f9bdb845fe47ec50fad599bc985f737c73b2174998f0275857a91a6ebdc4b59140ca5b8bbd2c41d71abfade7fc52e0d971a22629527e1c47505130289c30a13b91ed209e62a5ce1935922779d4f55d9659c77278a2230c40af99297eaba4f3d18dc96586185e94d5b916f1a4eda903930b74caf013af3cb8f3d66ff032956fe148e05d76b4974aa505de1b31a336222de61a62c421d95aa4896e4c431f9389628e0694ad70818702fa0a37354c12b0343c84e121a1468361fb78ae02154a54a3c36d3dd7074e5d6638a1bfd4ce851c9689696c77a6862ef65e342b569d25aac35212e423fd3624f4909009f82722ad99b9e98e8a4c74feb23ed849420c0746b20fc80b2b58358d84cbd88127f0ab676dc6beea6b909d954ae7c13185dbb40e7c8de520c9b06613ddf03ec31ee1dfbf0f48027a6c55e84e46f6ac5f35afa3e17336bc9b23a86e34ef4fe8dc847dbd122a21d8528d3abee25fc3c57f957239b55bb3a21d13c904e4467e06dc6b042354161f7c3406440e165f4031c8725ec6c9af3b9cee1ac08489cdcc87860bd5b5594306ac9746a9c411010653087649388901d56cbf2438d024e2f0ded7c674c691c4bd7cc10f291cc0814174417c4fb7459807e1d4bedeeb9d28c243eb81d9bf6dbe55a0c63f9e51188ee84ceadde0d8ea631660e1bec9a49e3d0fe9d00a3b2d4519fe4f378a39c5c6c86301b5857e79545c18ad5d7d8573840b3f781ce7f3858ac64a51fb0d7921fe9b8609d7789a06f809a138b2a672832da9ab63519dd7bc26b152c22c52a804a420897de8d0611201d19d1351ddb41b6f0d2bc45689d842efa76bcc3fe9400bfa1103e6cf17154bc51be7da1e40d5271fed255d7217f4f5b6390dcafbb613f06d3bef98659a2fb9b4a4d06b07e13285e5310efe29b4c54f903b5151b64098eccbea1f0ca0223c76e0fb30274af9ec77dd46a32dccdd6b96cee2c947e551573520d48c1a4d836b78981f9e22f2d95dcde279a843193f15534a411cc2d1f86e0ba490ff32341e2749a0a6aea3278ad6e9062e5cf38e9e0402f6c08d892503981449279b5c2cefadb48fd31082ecb80bb0c8c0c29a4701982ebd90e109cf0eb408d58f73dd7a322248295e237828f25bd698274d45de960da6ad71731da0692ca1798bddc6b9eec3827f78d436e61998dcf944b093661ff30ebbcbbb1b9d9e52a2cdade5651662912ef4ff6f66f7882edd90c5f9850ebfb28cb99bcad245bede7a61f7ae66e34ddbf372342e3e94bc1c37de6d6aa2a75769eec8fcb74ad76dd970ccebdd6e23c958a6b2c6e7fc856eaecddc1bd2fb812ddf5ea112c382b475b8ded7a11c12c34f0720e27294d66bae663b7b9edb687541a6cf9ea79bc23936e7741d32bb60b577f5def285ee0adda27ce7d97118854e09c3708cb75335f9c15ee7ea0c716579c7c68d04dc3d3cbd6de3bd0739f67312a1b63f894d4fd19215c4dc421a35141696b8ddc6c572c5b89dea5131a7d35f6f53e180067efef9b7c753645570643813cf6ee819c3e264dc6a0dcaee8975bdd0f51c189c7dc81bb12fdf6fa56c567618e499576ad46908892311d6bdfd16025d09e82be54f415a6460aa1d6916cfc10da8c6aa966ac48d78b8320c141d5b0004bb09f2b4d4f64a813cb0c05857eb538318797bb0560009288b79488df8b023f80c1c484e1e9317d5c56aa8eedff292029679a47a88fce1d399acc8bc0cfe9e3ab844bd69f04d808c7f9ed3675b2740f2a50b6b746f12a3b36bccdca52c20d5157ab7961a53e7a45b669f48d1f87dc8a77a80b47bccee9e3fe6492c3e8d3a3e32e55e857fce14129e04930481835433f68e2a5e5f177042baffd3a755ea5d5e532bea032ee38854be16a99ee230ea077d869d9236a52226848ea05982b273f2c617c265b8974d0778648e56e279d592ad8eb9abebad00a4c3ccd0a82077f69d77a11346e85bde28074d2be76621da80348f52017a18b76a5cb0373234b65cae570b5f742c097864f69569ab97f1e414fec84d897b990bdc542a19ba0518eb5163862725376b71ada77b3e46e6636dc696992b1137bd858a9ff4930b6ed8650151c5232330456b3290b2041eb06a63d1ec06bbc6f1883ed23ca8a76d30d20ddea86c93c4682bb9fa019cec99b8729a54ae7e217a6cf2406d030a346b54a4e3fee686d921d73f4f9313e8b520dd4aaffd8d4a06410804a48fc0f4300ea36cfbd985ad4db905eae9a979a263f0ea014b02c6590aec890cfe65f73b0e730ffab6281131071a4989db2be7d3668a65f417edba8ca4c731f5c3fa755c119590d8ecf84453ce32f92b8e92ba989922b2658c0d34308eea0c6b1196c5f19e6d9f398149d4261f588079026f21a0248cb298ee607dc5e369380e7e54def45048250dafc50a1ad0d9f733a4ccfc3389bf165b8ef4360cdd91f990740ac0b951ec43fc65cac07eb510507917f9eb4a020c123ea962ba286fb98df4c2d3fad2ce182c1b7a689ce5f9609be7c2b00eed690fb52c3590e711e8442a7834d2857ad56a8268a69250bab67f88f00a16227da3234b4746f695602b43bac421132cb0a1712dcbe8dab5d2077041458520ff6fd7a769daadee8e9108b218188e9d05367f091d0ad6608d8def153060a149dc9673e06b7db36da291f572e728281b02310f950790325ac3191214955608520f0860a328e51ce3766ea21d4a696e49829e4fef0d1fc3ef392e33bdcd94bfdfbd6f90709e7940fec071b845fdb29f86fdc209b74f269bb488302babf08515e6b95d4b42c20aa04d43b3b6bc86f7d87899dcdbaa270cf8f6a55943c5edd7c88b57fca0b81e1e8caa4a22702f2907e374ba227c46c27eed006e099c8bc30669b979548e561a10306920da6f6509a7c", 0x1000}, {&(0x7f00000000c0)}], 0x6, 0x0, 0x0, 0x8800}, 0x40) r2 = accept4(r0, 0x0, 0x0, 0x40000) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000024c0)=""/170) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 704.413443][T26634] loop3: unable to read partition table [ 704.423402][T26617] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 704.452433][T26634] loop3: partition table beyond EOD, truncated [ 704.514014][T26617] loop2: p3 size 2 extends beyond EOD, truncated [ 704.534457][T26634] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) [ 704.607850][T26617] loop2: p4 size 32768 extends beyond EOD, truncated [ 704.636509][T26617] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:55:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) io_setup(0x8000, &(0x7f0000000000)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x600800, 0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x1000, r2, &(0x7f0000000080)="c93fd3a4b0ec33914c1e44e996760453360ad3b91c138f2d6a815a7ea8f7f22cffa5d06b9d2f71690be906bcf1494dcbbcfed0a6f2", 0x35, 0x7ff, 0x0, 0x2, r3}, &(0x7f0000000180)) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 704.666204][T26654] device nr0 entered promiscuous mode [ 704.687044][T26617] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) 16:55:17 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 704.835393][T26653] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 704.840745][T26653] loop4: partition table partially beyond EOD, truncated [ 704.868024][T26653] loop4: p1 start 1 is beyond EOD, truncated [ 704.895911][T26653] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 704.913752][T26653] loop4: p3 size 2 extends beyond EOD, truncated [ 704.930041][T26653] loop4: p4 size 32768 extends beyond EOD, truncated 16:55:17 executing program 2: syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 704.946182][T26653] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 704.958361][T26653] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) r4 = openat$cgroup(r3, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x40, 0x8, 0x1, 0x52, 0x0, 0x9, 0x4956, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x10001, 0x7}, 0x4000, 0x200, 0x8001, 0x8, 0x7, 0x6, 0x7f}, r4, 0x1, 0xffffffffffffffff, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa}, r5, 0x0, 0xffffffffffffffff, 0x8) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x0, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYRES64, @ANYRES16, @ANYPTR, @ANYBLOB="fc2dffe80a90f3c86a1c11c471f9426be683b7486be64df69a82490d1083b5469d9dddfb37b6b58c5e05b84131490655a85b3fde77089313867ddb0a3c8fd592f7c34854da83b39b00f76ec8bfab272a8a7c84ec05056350ea0ff3d76e6ff86cc8c752bfc435d91d03768696d0e40f4e0d3a637ced0ac1f1555a02", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r6]], 0x95) openat$cgroup(r5, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) close(0xffffffffffffffff) ioctl$TUNSETLINK(r7, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='nr0\x01\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) 16:55:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100), 0x0) 16:55:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) recvmsg(r2, &(0x7f00000001c0)={&(0x7f0000000080)=@generic, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/78, 0x4e}], 0x1, &(0x7f0000000300)=""/4096, 0x1000}, 0x100) [ 705.126815][T26669] Dev loop3: unable to read RDB block 1 [ 705.132411][T26669] loop3: unable to read partition table [ 705.224782][T26669] loop3: partition table beyond EOD, truncated [ 705.270852][T26669] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 16:55:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r5, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, 0xffffffff, 0x4, 0x40, &(0x7f0000ff9000/0x3000)=nil, 0x3f9d}) r6 = accept4(r2, 0x0, 0x0, 0x180000) readv(r6, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100), 0x0) 16:55:17 executing program 4: syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 705.495239][T26682] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 705.498298][T26675] device nr0 entered promiscuous mode [ 705.500601][T26682] loop2: partition table partially beyond EOD, truncated [ 705.529779][T26682] loop2: p1 start 1 is beyond EOD, truncated [ 705.548190][T26682] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 705.599137][T26682] loop2: p3 size 2 extends beyond EOD, truncated [ 705.623685][T26682] loop2: p4 size 32768 extends beyond EOD, truncated 16:55:18 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 705.672958][T26682] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 705.704950][T26682] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100), 0x0) [ 705.938713][T26703] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 705.972688][T26703] loop4: partition table partially beyond EOD, truncated [ 705.985378][T26718] Dev loop3: unable to read RDB block 1 [ 706.003141][T26718] loop3: unable to read partition table 16:55:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000080)={'erspan0\x00', 0x1}) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 706.023657][T26703] loop4: p1 start 1 is beyond EOD, truncated [ 706.024848][T26718] loop3: partition table beyond EOD, truncated [ 706.054906][T26703] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:55:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{0x0}], 0x1) [ 706.096828][T26718] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 706.098760][T26703] loop4: p3 size 2 extends beyond EOD, truncated 16:55:18 executing program 2: syz_read_part_table(0x2, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) r4 = openat$cgroup(r3, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x40, 0x8, 0x1, 0x52, 0x0, 0x9, 0x4956, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x10001, 0x7}, 0x4000, 0x200, 0x8001, 0x8, 0x7, 0x6, 0x7f}, r4, 0x1, 0xffffffffffffffff, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa}, r5, 0x0, 0xffffffffffffffff, 0x8) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x0, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) write$cgroup_subtree(r5, &(0x7f0000000600)=ANY=[@ANYRES64, @ANYRES16, @ANYPTR, @ANYBLOB="fc2dffe80a90f3c86a1c11c471f9426be683b7486be64df69a82490d1083b5469d9dddfb37b6b58c5e05b84131490655a85b3fde77089313867ddb0a3c8fd592f7c34854da83b39b00f76ec8bfab272a8a7c84ec05056350ea0ff3d76e6ff86cc8c752bfc435d91d03768696d0e40f4e0d3a637ced0ac1f1555a02", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r6]], 0x95) openat$cgroup(r5, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) close(0xffffffffffffffff) ioctl$TUNSETLINK(r7, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='nr0\x01\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) [ 706.166585][T26703] loop4: p4 size 32768 extends beyond EOD, truncated [ 706.232577][T26703] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 706.247937][T26703] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000000)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$llc(r4, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000080)={{0x81, 0x20}, {0x9, 0x20}, 0x8, 0xd, 0x7f}) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:18 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 706.491735][T26735] device nr0 entered promiscuous mode 16:55:19 executing program 4: syz_read_part_table(0x6, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{0x0}], 0x1) [ 706.809685][T26756] Dev loop3: unable to read RDB block 1 [ 706.826287][T26756] loop3: unable to read partition table 16:55:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x4000) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 706.856610][T26746] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 706.875968][T26756] loop3: partition table beyond EOD, truncated [ 706.884612][T26746] loop2: partition table partially beyond EOD, truncated 16:55:19 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc000c00044002000000053582c137153e370300000001f01700d1bd", 0x2e}], 0x1}, 0x0) [ 706.941660][T26756] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 706.961104][T26746] loop2: p1 start 1 is beyond EOD, truncated [ 707.000330][T26746] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 707.015405][T26746] loop2: p3 size 2 extends beyond EOD, truncated 16:55:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{0x0}], 0x1) [ 707.091266][T26746] loop2: p4 size 32768 extends beyond EOD, truncated [ 707.101110][T26778] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 707.101748][T26746] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:55:19 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 707.188462][T26746] loop2: p6 size 32768 extends beyond EOD, truncated [ 707.269351][T26778] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 707.357138][T26790] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 707.378892][T26790] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. 16:55:19 executing program 2: syz_read_part_table(0x3, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x4, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "1fece379d6386f36", "fc780f99cd9966da8622f116ee4a058d", "31f1f25b", "30048c872dc03f59"}, 0x28) sendto$inet6(r0, &(0x7f0000000240)='\x00', 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) [ 707.406130][T26771] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 707.417528][T26771] loop4: partition table partially beyond EOD, truncated [ 707.433754][T26771] loop4: p1 start 1 is beyond EOD, truncated [ 707.498437][T26771] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 707.505246][T26792] Dev loop3: unable to read RDB block 1 [ 707.511300][T26792] loop3: unable to read partition table [ 707.532588][T26792] loop3: partition table beyond EOD, truncated [ 707.533700][T26771] loop4: p3 size 2 extends beyond EOD, truncated 16:55:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x34, r3, 0x909, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x34, r5, 0x909, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80008100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x8, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x400c008) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:19 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6(0xa, 0x80003, 0xff) socket$inet(0x2, 0x4000000000000001, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0800b5055ef6cfe87b2071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 707.545471][T26792] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 707.573848][T26771] loop4: p4 size 32768 extends beyond EOD, truncated [ 707.597276][T26798] vcan0: MTU too low for tipc bearer [ 707.597365][T26771] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 707.620662][T26798] tipc: Enabling of bearer rejected, failed to enable media [ 707.698799][T26798] vcan0: MTU too low for tipc bearer [ 707.711907][T26798] tipc: Enabling of bearer rejected, failed to enable media [ 707.795540][T26771] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:20 executing program 4: syz_read_part_table(0x7, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 707.846826][T26798] vcan0: MTU too low for tipc bearer [ 707.864738][T26798] tipc: Enabling of bearer rejected, failed to enable media [ 707.889660][T26818] vcan0: MTU too low for tipc bearer 16:55:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) [ 707.913220][T26818] tipc: Enabling of bearer rejected, failed to enable media 16:55:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 708.030691][T26810] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 708.060841][T26810] loop2: partition table partially beyond EOD, truncated 16:55:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0xffffffffffffeb3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 708.134629][T26810] loop2: p1 start 1 is beyond EOD, truncated [ 708.208881][T26810] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 708.241273][T26810] loop2: p3 size 2 extends beyond EOD, truncated [ 708.257841][T26810] loop2: p4 size 32768 extends beyond EOD, truncated [ 708.267998][T26836] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 708.273513][T26836] loop4: partition table partially beyond EOD, truncated [ 708.292540][T26810] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 708.294005][T26836] loop4: p1 start 1 is beyond EOD, truncated 16:55:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r1, 0x8}, &(0x7f0000000140)=0x8) r3 = socket$alg(0x26, 0x5, 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000380)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PPPIOCGMRU(r4, 0x80047453, &(0x7f00000003c0)) r5 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x13f, 0x1}}, 0x20) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-ce\x00'}, 0x58) r6 = accept4(r3, 0x0, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000300)={r2, 0x5}, &(0x7f0000000340)=0x8) ioctl$SIOCRSGCAUSE(r6, 0x89e0, &(0x7f00000002c0)) readv(r6, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 708.302049][T26810] loop2: p6 size 32768 extends beyond EOD, truncated [ 708.306242][T26836] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 708.334322][T26836] loop4: p3 size 2 extends beyond EOD, truncated [ 708.341757][T26836] loop4: p4 size 32768 extends beyond EOD, truncated [ 708.398535][T26836] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:55:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) [ 708.443130][T26836] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:21 executing program 0: io_setup(0xdb, &(0x7f0000000180)=0x0) io_getevents(r0, 0x6, 0x6, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000080)={0x0, 0x1c9c380}) 16:55:21 executing program 2: syz_read_part_table(0x4, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:21 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 16:55:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x4000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:21 executing program 4: syz_read_part_table(0x8, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:21 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r3, r0, 0x0, 0x2) sendfile(r0, r3, &(0x7f0000000000), 0x7) 16:55:21 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x2) r2 = socket$inet(0x2, 0x3, 0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x7) 16:55:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_create1(0x0) readv(r2, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/3}, {&(0x7f0000000140)=""/11}, {&(0x7f0000000180)=""/250}, {&(0x7f0000000300)=""/246}, {&(0x7f0000000400)=""/56}], 0x15d) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r5, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={r5, 0x2}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000004c0)={r5, @in={{0x2, 0x4e24, @local}}}, 0x84) 16:55:21 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) [ 709.222227][T26894] syz-executor.5 (26894): /proc/26894/oom_adj is deprecated, please use /proc/26894/oom_score_adj instead. [ 709.245273][T26883] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 709.255707][T26883] loop2: partition table partially beyond EOD, truncated [ 709.283146][T26883] loop2: p1 start 1 is beyond EOD, truncated [ 709.313079][T26883] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 709.377950][T26883] loop2: p3 size 2 extends beyond EOD, truncated 16:55:21 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x6433ddef2e3f27ca, 0xa3) getsockopt$inet_int(r3, 0x0, 0xb, &(0x7f0000000040), &(0x7f0000000140)=0x4) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) dup(r4) socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000002000"], 0xb8}}, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) [ 709.440406][T26883] loop2: p4 size 32768 extends beyond EOD, truncated [ 709.464880][T26883] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 709.482325][T26883] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:21 executing program 1: rt_sigsuspend(&(0x7f0000000080)={0x80000000}, 0x8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{0x20, 'ppp0,mime_type'}]}, 0x1a) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:22 executing program 5: [ 709.712604][T26896] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 709.756987][T26896] loop4: partition table partially beyond EOD, truncated [ 709.787298][T26896] loop4: p1 start 1 is beyond EOD, truncated 16:55:22 executing program 2: syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 709.832537][T26896] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 709.866554][T26896] loop4: p3 size 2 extends beyond EOD, truncated 16:55:22 executing program 3: [ 709.910081][T26896] loop4: p4 size 32768 extends beyond EOD, truncated [ 709.944025][T26896] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 709.994717][T26896] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:22 executing program 5: 16:55:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x6433ddef2e3f27ca, 0xa3) getsockopt$inet_int(r3, 0x0, 0xb, &(0x7f0000000040), &(0x7f0000000140)=0x4) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) dup(r4) socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000002000"], 0xb8}}, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 16:55:22 executing program 4: syz_read_part_table(0x9, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r3, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000)={0x6}, 0x4) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) readv(r5, &(0x7f0000000100), 0x0) 16:55:22 executing program 3: 16:55:22 executing program 3: [ 710.417511][T26944] loop2: p1 < > p2 p3 < p5 p6 > p4 16:55:22 executing program 5: [ 710.454805][T26944] loop2: partition table partially beyond EOD, truncated [ 710.514960][T26944] loop2: p1 start 1 is beyond EOD, truncated [ 710.581260][T26944] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:55:23 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000140)}}, 0x18) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0xa0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, &(0x7f00000001c0)) r2 = accept4(r1, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x544}], 0x1) [ 710.664975][T26944] loop2: p3 size 2 extends beyond EOD, truncated 16:55:23 executing program 3: 16:55:23 executing program 5: [ 710.722179][T26944] loop2: p4 size 32768 extends beyond EOD, truncated [ 710.747300][T26944] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 710.787524][T26944] loop2: p6 size 32768 extends beyond EOD, truncated [ 710.885299][T26961] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 710.913659][T26961] loop4: partition table partially beyond EOD, truncated [ 711.012117][T26961] loop4: p1 start 1 is beyond EOD, truncated 16:55:23 executing program 2: syz_read_part_table(0x6, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:23 executing program 0: 16:55:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) pipe2$9p(&(0x7f0000000000), 0x80000) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup(r6) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r7, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {r8, 0x3, 0x0, 0x0, 0x0, @ib={0x1b, 0x1, 0x3, {"af93242981bc8f5078e28c0a1bfe67d0"}, 0xffffffffffffffff, 0x3, 0xa3}, @in6={0xa, 0x8, 0x8, @loopback, 0xc3}}}, 0x118) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = dup2(r11, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r6, 0x3) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = dup2(r13, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getpeername$tipc(r14, &(0x7f0000000380), 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r15, r15) r16 = getpid() sched_setscheduler(r16, 0x5, &(0x7f00000002c0)) ioctl$sock_FIOSETOWN(r15, 0x8901, &(0x7f0000000180)=r16) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:23 executing program 5: [ 711.064750][T26961] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 711.087989][T26961] loop4: p3 size 2 extends beyond EOD, truncated [ 711.145096][T26961] loop4: p4 size 32768 extends beyond EOD, truncated [ 711.189667][T26961] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 711.212694][T26961] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:23 executing program 4: syz_read_part_table(0xa, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:23 executing program 3: 16:55:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x280000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000080)={0x3, 0x1, 0x8f, {0x0, 0x1c9c380}, 0x5c32feaf, 0x3f}) 16:55:23 executing program 0: 16:55:23 executing program 5: [ 711.485248][T26993] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 711.509314][T26993] loop2: partition table partially beyond EOD, truncated [ 711.528955][T26993] loop2: p1 start 1 is beyond EOD, truncated [ 711.594914][T26993] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:55:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = fcntl$dupfd(r0, 0x1996d14ee4535957, r1) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000000)) 16:55:24 executing program 0: [ 711.645320][T26993] loop2: p3 size 2 extends beyond EOD, truncated [ 711.677606][T26993] loop2: p4 size 32768 extends beyond EOD, truncated 16:55:24 executing program 3: [ 711.697126][T26993] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 711.764814][T26993] loop2: p6 size 32768 extends beyond EOD, truncated [ 711.965283][T27011] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 711.970591][T27011] loop4: partition table partially beyond EOD, truncated [ 711.978016][T27011] loop4: p1 start 1 is beyond EOD, truncated [ 711.984088][T27011] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 711.992084][T27011] loop4: p3 size 2 extends beyond EOD, truncated [ 711.999520][T27011] loop4: p4 size 32768 extends beyond EOD, truncated [ 712.010248][T27011] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 712.036088][T27011] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:24 executing program 2: syz_read_part_table(0x7, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:24 executing program 5: 16:55:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_NMI(r3, 0xae9a) 16:55:24 executing program 3: [ 712.182998][T27011] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 712.183896][T27030] print_req_error: 45 callbacks suppressed [ 712.183916][T27030] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 712.284881][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 712.295869][ T2503] buffer_io_error: 40 callbacks suppressed [ 712.295881][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 712.327324][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 712.338251][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 712.349531][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 712.360470][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read 16:55:24 executing program 4: syz_read_part_table(0x10, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:24 executing program 0: 16:55:24 executing program 5: [ 712.372167][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 712.383501][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 712.392244][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 712.403137][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 712.411414][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:55:24 executing program 3: [ 712.422289][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 712.442843][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 712.453764][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 712.464952][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 712.475850][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 712.484004][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 712.494914][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 712.503042][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read 16:55:25 executing program 0: 16:55:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = semget$private(0x0, 0x8, 0x0) semctl$IPC_RMID(r4, 0x0, 0x0) semctl$SEM_STAT(r4, 0x2, 0x12, &(0x7f0000000140)=""/246) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) 16:55:25 executing program 3: 16:55:25 executing program 5: [ 712.762508][T27044] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 712.794931][T27044] loop2: partition table partially beyond EOD, truncated [ 712.814112][T27048] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 712.829632][T27044] loop2: p1 start 1 is beyond EOD, truncated [ 712.884212][T27044] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 712.891700][T27048] loop4: partition table partially beyond EOD, truncated [ 712.954275][T27048] loop4: p1 start 1 is beyond EOD, truncated [ 712.962017][T27044] loop2: p3 size 2 extends beyond EOD, truncated [ 712.985396][T27048] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 712.993490][T27044] loop2: p4 size 32768 extends beyond EOD, truncated [ 713.008667][T27044] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 713.016554][T27048] loop4: p3 size 2 extends beyond EOD, truncated [ 713.030444][T27048] loop4: p4 size 32768 extends beyond EOD, truncated [ 713.043189][T27044] loop2: p6 size 32768 extends beyond EOD, truncated [ 713.059470][T27048] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 713.084014][T27048] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:25 executing program 2: syz_read_part_table(0x8, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:25 executing program 0: 16:55:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x4000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$alg(r3, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) dup2(r10, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r11 = accept4(r0, 0x0, 0x0, 0x0) readv(r11, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) fcntl$getownex(r3, 0x10, &(0x7f0000000140)={0x0, 0x0}) pidfd_open(r12, 0x0) 16:55:25 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:25 executing program 4: syz_read_part_table(0x23, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$TIOCLINUX2(r0, 0x541c, 0x0) 16:55:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000480)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) getsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 16:55:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x100) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000080)={0x0, r3, 0x1}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x7, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x43b, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x38}}, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@ll={0x11, 0x2, r8, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="31c8deabc2c4067f9fdf8bb937e59ca55a2f503baa3160f6f75af8bd937a5a51d827cb41b0f2ab35f51d9fdfbbce5155b56c5781dc03c179ead3feae4b43ade3b28fdc1fe385552ee6a22b1bd9c44ce4ac793df4c309161600a0a5850ae97a752ec3cf1eeebad98e0add4f3a41748f7478952203ed24af37e0cf172f3991ee3ac5ebaa745002be177507ffe17b7bf042e7f40165f8733c4dc5b86553f514bb49851007bf4607f80ca303e7b6411cdd571e30cfdf16d6db0278b6f5b4fc8e08a6d7031d40f83e09ed1a", 0xc9}, {&(0x7f00000001c0)="77ad8b8bdcb1547fb5c2092323417238edbc0432188115d4170b2dbaf0b8bc75f23f31dbf4955cf269ff7ec5bce3815085102c2f4f1ca07dc74dcb386355df132b356162a257fb63f5c0fc0569227b60cb44c55c188e32a1fa3f", 0x5a}], 0x3, &(0x7f0000001400)=[{0x78, 0x84, 0x5, "0744d78cf316233f266cfed7875d36ba9d00db5bcd0fad7a5837a2eaa777d87d38dd6d0bb67cbfddc2b407011d06a113453baa3ab67a9a9ef995c26d7866f489ca9e15f5d9c2447319a178eb2e37b4f161500ec2a6307d744b14c45bfd5675e1129f200c16e91f8b"}], 0x78}, 0x40) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:26 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:26 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60002007}) timerfd_settime(r2, 0x0, &(0x7f0000000140)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x12, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)={0xa0002005}) [ 713.746031][T27107] netlink: 'syz-executor.1': attribute type 15 has an invalid length. 16:55:26 executing program 3: request_key(&(0x7f0000000980)='blacklist\x00', &(0x7f00000009c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffd) 16:55:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, @in6={0xa, 0x4e24, 0x400, @loopback, 0x20000}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e20, 0x0, @rand_addr="b144367e132b040409af4bc639f1201b"}], 0x58) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 713.885246][T27091] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 713.904731][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 713.910541][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 713.935114][T27091] loop2: partition table partially beyond EOD, truncated [ 713.967370][T27091] loop2: p1 start 1 is beyond EOD, truncated [ 714.007005][T27091] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 714.015307][T27105] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 714.020642][T27105] loop4: partition table partially beyond EOD, truncated [ 714.049665][T27091] loop2: p3 size 2 extends beyond EOD, truncated [ 714.057797][T27105] loop4: p1 start 1 is beyond EOD, truncated [ 714.078558][T27105] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 714.086209][T27091] loop2: p4 size 32768 extends beyond EOD, truncated [ 714.103643][T27105] loop4: p3 size 2 extends beyond EOD, truncated [ 714.114170][T27091] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 714.130148][T27105] loop4: p4 size 32768 extends beyond EOD, truncated [ 714.163520][T27091] loop2: p6 size 32768 extends beyond EOD, truncated [ 714.177440][T27105] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 714.205242][T27105] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:26 executing program 2: syz_read_part_table(0x9, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:26 executing program 3: syz_read_part_table(0x10, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:26 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = semget$private(0x0, 0x8, 0x0) semctl$IPC_RMID(r4, 0x0, 0x0) semctl$SEM_STAT(r4, 0x2, 0x12, &(0x7f0000000140)=""/246) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) 16:55:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000000), 0x0) 16:55:26 executing program 4: syz_read_part_table(0x48, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:27 executing program 0: syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:27 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:27 executing program 1: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x32, @multicast2, 0x4e23, 0x4, 'lc\x00', 0x1, 0x7, 0x64}, 0x2c) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000140)=0x8) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x8100, 0x0) r4 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r5, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000300)={r5, 0x17}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000040)={r5}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f00000013c0)={r5, &(0x7f00000003c0)=""/4096}) connect$tipc(r2, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x1, 0x3}}, 0x10) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r6 = socket(0x6, 0x805, 0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f0000000200)) getsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) [ 714.837516][T27141] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 714.874729][T27141] loop3: partition table partially beyond EOD, truncated [ 714.917271][T27141] loop3: p1 start 1 is beyond EOD, truncated [ 714.960441][T27141] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 714.968630][T27149] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 714.974012][T27149] loop4: partition table partially beyond EOD, truncated [ 715.007527][T27149] loop4: p1 start 1 is beyond EOD, truncated [ 715.017750][T27141] loop3: p3 size 2 extends beyond EOD, truncated [ 715.020455][T27149] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 715.024718][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 715.037104][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 715.057580][T27155] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 715.061056][T27141] loop3: p4 size 32768 extends beyond EOD, truncated [ 715.068353][T27155] loop2: partition table partially beyond EOD, truncated [ 715.073524][T27141] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 715.079902][T27149] loop4: p3 size 2 extends beyond EOD, truncated [ 715.084631][T27141] loop3: p6 size 32768 extends beyond EOD, truncated 16:55:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x51, 0x400) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r0, 0x0, 0x0, 0x81800) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 715.110334][T27155] loop2: p1 start 1 is beyond EOD, truncated [ 715.127889][T27149] loop4: p4 size 32768 extends beyond EOD, truncated 16:55:27 executing program 5: socket$packet(0x11, 0x3, 0x300) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 715.155179][T27155] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 715.173066][T27149] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 715.212015][T27155] loop2: p3 size 2 extends beyond EOD, truncated [ 715.232575][T27149] loop4: p6 size 32768 extends beyond EOD, truncated [ 715.236151][T27155] loop2: p4 size 32768 extends beyond EOD, truncated [ 715.268947][T27155] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 715.312251][T27155] loop2: p6 size 32768 extends beyond EOD, truncated [ 715.347690][T27170] loop0: p1 < > p2 p3 < p5 p6 > p4 16:55:27 executing program 3: syz_read_part_table(0x10, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 715.394855][T27170] loop0: partition table partially beyond EOD, truncated [ 715.402138][T27170] loop0: p1 start 1 is beyond EOD, truncated [ 715.433694][T27170] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 715.469512][T27170] loop0: p3 size 2 extends beyond EOD, truncated [ 715.487194][T27170] loop0: p4 size 32768 extends beyond EOD, truncated [ 715.565131][T27170] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 715.593730][T27170] loop0: p6 size 32768 extends beyond EOD, truncated 16:55:28 executing program 2: syz_read_part_table(0xa, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r2) r3 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000740)="57e4b400eef61ceae6a7d635527f4cbe9ca49eadc274502524eb86dcb2322a0d21a7c6e2cb617e88b32e64404c0d979e0826cbd89894327cd67acfe63fc65f52539594aadfc176601d4584f4dbe47e908be3e64ca4bcc72853fd41747358f7a35bb9fc044217ef13b88b29e593ba506f260611b8605602d9b5f3ad55146d1ba836bf51013bf09b044044c37e4ea4358e030f673ac980490829fb50611f992dd13eaf6060d2f00b2c04b6e5a73047722eb2", 0xb1, r2) r4 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) dup2(r1, r6) getsockopt$sock_int(r5, 0x1, 0x79, &(0x7f00000008c0), &(0x7f0000000900)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000880)=@keyring={'key_or_keyring:', r4}) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/36, 0xffffff70}, {&(0x7f0000000140)=""/173}, {&(0x7f0000000300)=""/148}, {&(0x7f0000000080)=""/121}, {&(0x7f00000003c0)=""/202}, {&(0x7f00000004c0)=""/253}, {&(0x7f0000000200)=""/27}, {&(0x7f00000005c0)=""/202}], 0x38a) 16:55:28 executing program 5: socket$packet(0x11, 0x3, 0x300) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:28 executing program 4: syz_read_part_table(0x4c, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:28 executing program 0: syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:28 executing program 5: socket$packet(0x11, 0x3, 0x300) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 716.094883][T27194] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 716.134798][T27194] loop3: partition table partially beyond EOD, truncated [ 716.199364][T27194] loop3: p1 start 1 is beyond EOD, truncated [ 716.234820][T27194] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 716.265216][T27210] loop4: p1 < > p2 p3 < p5 p6 > p4 16:55:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(echainiv(aegis128l-aesni))\x00'}, 0x19) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x34, r5, 0x909, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1) [ 716.288653][T27194] loop3: p3 size 2 extends beyond EOD, truncated [ 716.295503][T27210] loop4: partition table partially beyond EOD, truncated [ 716.323323][T27194] loop3: p4 size 32768 extends beyond EOD, truncated [ 716.334908][T27210] loop4: p1 start 1 is beyond EOD, truncated [ 716.349526][T27194] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 716.369103][T27194] loop3: p6 size 32768 extends beyond EOD, truncated [ 716.377015][T27210] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:55:28 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 716.382981][T27232] vcan0: MTU too low for tipc bearer [ 716.408565][T27232] tipc: Enabling of bearer rejected, failed to enable media [ 716.412406][T27210] loop4: p3 size 2 extends beyond EOD, truncated [ 716.435985][T27210] loop4: p4 size 32768 extends beyond EOD, truncated [ 716.443598][T27210] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 716.455227][T27210] loop4: p6 size 32768 extends beyond EOD, truncated [ 716.465689][T27226] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 716.517346][T27226] loop0: partition table partially beyond EOD, truncated [ 716.558120][T27223] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 716.563447][T27223] loop2: partition table partially beyond EOD, truncated [ 716.564554][T27226] loop0: p1 start 1 is beyond EOD, truncated [ 716.623335][T27223] loop2: p1 start 1 is beyond EOD, truncated [ 716.657732][T27210] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 16:55:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 716.694536][T27223] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:55:29 executing program 3: syz_read_part_table(0x10, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 716.750700][T27226] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 716.768156][T27223] loop2: p3 size 2 extends beyond EOD, truncated [ 716.838045][T27223] loop2: p4 size 32768 extends beyond EOD, truncated [ 716.855863][T27226] loop0: p3 size 2 extends beyond EOD, truncated 16:55:29 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 716.895278][T27226] loop0: p4 size 32768 extends beyond EOD, truncated [ 716.902455][T27223] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 716.929417][T27223] loop2: p6 size 32768 extends beyond EOD, truncated [ 716.951372][T27226] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 716.982387][T27226] loop0: p6 size 32768 extends beyond EOD, truncated 16:55:29 executing program 4: syz_read_part_table(0x60, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 717.257226][T27269] print_req_error: 44 callbacks suppressed [ 717.257296][T27269] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 717.352387][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.363339][ T2504] buffer_io_error: 40 callbacks suppressed [ 717.363352][ T2504] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 717.378110][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.389056][ T2504] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 717.399415][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.410325][ T2504] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 717.423006][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.434052][ T2504] Buffer I/O error on dev loop4p5, logical block 0, async page read 16:55:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x164, r1, 0x1, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x120, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa1eb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2d9}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd387}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bond\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffa}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, '\x00'}}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008840) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000000)) r5 = accept4(r2, 0x0, 0x0, 0x0) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2000, 0x0) 16:55:29 executing program 2: syz_read_part_table(0x10, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 717.464019][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.474935][ T2503] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 717.483746][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.494906][ T2503] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 717.503124][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.514045][ T2503] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 717.522288][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.533190][ T2503] Buffer I/O error on dev loop4p5, logical block 0, async page read [ 717.541354][ T2503] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 717.552313][ T2503] Buffer I/O error on dev loop4p5, logical block 0, async page read 16:55:29 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 717.560853][ T2503] Buffer I/O error on dev loop4p5, logical block 0, async page read 16:55:30 executing program 0: syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 717.635273][T27272] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 717.688149][T27272] loop3: partition table partially beyond EOD, truncated [ 717.744321][T27272] loop3: p1 start 1 is beyond EOD, truncated [ 717.769304][T27272] loop3: p2 size 1073741824 extends beyond EOD, truncated 16:55:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0xa203, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x20000000}}, 0x7, 0x1f}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x8000}, &(0x7f0000000200)=0x8) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 717.815159][T27272] loop3: p3 size 2 extends beyond EOD, truncated [ 717.841844][T27272] loop3: p4 size 32768 extends beyond EOD, truncated [ 717.865126][T27272] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 717.897933][T27272] loop3: p6 size 32768 extends beyond EOD, truncated [ 717.915251][T27282] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 717.942822][T27282] loop4: partition table partially beyond EOD, truncated 16:55:30 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 717.995924][T27282] loop4: p1 start 1 is beyond EOD, truncated [ 718.055775][T27282] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 718.119662][T27282] loop4: p3 size 2 extends beyond EOD, truncated [ 718.214965][T27282] loop4: p4 size 32768 extends beyond EOD, truncated [ 718.235218][T27303] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 718.235308][T27282] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:55:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001340)='/proc/capi/capi20\x00', 0x201001, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000001380)=@sack_info={r3, 0x9, 0x80}, &(0x7f00000013c0)=0xc) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000000)={0x2, 0x10000}) r4 = accept4(r0, 0x0, 0x0, 0x1800) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0xffffffffffffff57}], 0x1) [ 718.264874][T27303] loop0: partition table partially beyond EOD, truncated [ 718.296893][T27303] loop0: p1 start 1 is beyond EOD, truncated [ 718.300341][T27282] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0xa203, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x20000000}}, 0x7, 0x1f}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x8000}, &(0x7f0000000200)=0x8) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 718.314570][T27303] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 718.330451][T27303] loop0: p3 size 2 extends beyond EOD, truncated [ 718.341847][T27303] loop0: p4 size 32768 extends beyond EOD, truncated 16:55:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 718.369220][T27304] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 718.370792][T27303] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 718.381918][T27304] loop2: partition table partially beyond EOD, truncated [ 718.388842][T27303] loop0: p6 size 32768 extends beyond EOD, truncated [ 718.395044][T27304] loop2: p1 start 1 is beyond EOD, truncated [ 718.402396][T27304] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 718.413133][T27304] loop2: p3 size 2 extends beyond EOD, truncated [ 718.424021][T27304] loop2: p4 size 32768 extends beyond EOD, truncated [ 718.444962][T27304] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:55:30 executing program 4: syz_read_part_table(0x68, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 718.505640][T27304] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() r9 = getuid() stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, r9, r10, 0x160}, 0x6, 0x9, 0x5}) 16:55:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:31 executing program 0: syz_read_part_table(0x60, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:31 executing program 2: syz_read_part_table(0x23, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0xa203, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x20000000}}, 0x7, 0x1f}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x8000}, &(0x7f0000000200)=0x8) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r2, 0x0, 0x0, 0x40000) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x45, "4cad8e20d80dc62853dfbf20b1930aa0390e020427001c56d2f75dbc03841347ec9289a2ce6c852725926fd1abcb31d7f0ed97060bf5d8e502b27ddfefd7d6836ff2e39d66"}, &(0x7f0000000000)=0x69) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 719.358617][T27363] loop4: p1 < > p2 p3 < p5 p6 > p4 16:55:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 719.380885][T27363] loop4: partition table partially beyond EOD, truncated [ 719.430153][T27363] loop4: p1 start 1 is beyond EOD, truncated [ 719.494799][T27363] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 719.529919][T27363] loop4: p3 size 2 extends beyond EOD, truncated 16:55:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0xa203, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x20000000}}, 0x7, 0x1f}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x8000}, &(0x7f0000000200)=0x8) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000140)=""/200, 0xc8) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 719.609754][T27363] loop4: p4 size 32768 extends beyond EOD, truncated [ 719.647439][T27363] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 719.680374][T27363] loop4: p6 size 32768 extends beyond EOD, truncated [ 719.697751][T27385] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 719.711778][T27385] loop2: partition table partially beyond EOD, truncated 16:55:32 executing program 5: socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 719.726869][T27385] loop2: p1 start 1 is beyond EOD, truncated [ 719.749499][T27385] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 719.755225][T27384] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 719.762295][T27384] loop0: partition table partially beyond EOD, truncated [ 719.771963][T27385] loop2: p3 size 2 extends beyond EOD, truncated [ 719.784579][T27385] loop2: p4 size 32768 extends beyond EOD, truncated [ 719.815937][T27384] loop0: p1 start 1 is beyond EOD, truncated 16:55:32 executing program 4: syz_read_part_table(0x6c, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 719.856320][T27384] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 719.857580][T27385] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 719.894827][T27384] loop0: p3 size 2 extends beyond EOD, truncated 16:55:32 executing program 3: syz_read_part_table(0x68, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 719.904863][T27384] loop0: p4 size 32768 extends beyond EOD, truncated 16:55:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$alg(r4, 0x0, 0x0, 0x800) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000080)=[0x8], 0x1, 0x683, 0x2, 0x4d6, 0x2, 0x9, {0x7ff, 0x8000, 0x9, 0x6, 0x83, 0x1ffe, 0x8, 0xbebb, 0x9, 0x5, 0x363, 0x9, 0x800, 0x0, "11bfdf395f28748df200ac8658663e06c611abdee6981c2aef14e11885f66c58"}}) [ 719.928492][T27385] loop2: p6 size 32768 extends beyond EOD, truncated [ 719.955326][T27384] loop0: p5 size 1073741824 extends beyond EOD, truncated 16:55:32 executing program 5: socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 720.046877][T27384] loop0: p6 size 32768 extends beyond EOD, truncated [ 720.435849][T27423] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 720.441706][T27423] loop4: partition table partially beyond EOD, truncated 16:55:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() r9 = getuid() stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, r9, r10, 0x160}, 0x6, 0x9, 0x5}) 16:55:32 executing program 2: syz_read_part_table(0x48, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000000)) [ 720.524980][T27423] loop4: p1 start 1 is beyond EOD, truncated [ 720.537606][T27423] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 720.553564][T27437] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 720.562748][T27437] loop3: partition table partially beyond EOD, truncated 16:55:33 executing program 5: socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 720.587450][T27423] loop4: p3 size 2 extends beyond EOD, truncated [ 720.603171][T27437] loop3: p1 start 1 is beyond EOD, truncated [ 720.626284][T27437] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 720.634048][T27423] loop4: p4 size 32768 extends beyond EOD, truncated [ 720.639647][T27437] loop3: p3 size 2 extends beyond EOD, truncated [ 720.649423][T27423] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 720.650918][T27437] loop3: p4 size 32768 extends beyond EOD, truncated [ 720.684990][T27423] loop4: p6 size 32768 extends beyond EOD, truncated [ 720.718417][T27437] loop3: p5 size 1073741824 extends beyond EOD, truncated 16:55:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000080)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$TIPC_CONN_TIMEOUT(r4, 0x10f, 0x82, &(0x7f00000000c0)=0x9, 0x4) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 720.766391][T27437] loop3: p6 size 32768 extends beyond EOD, truncated 16:55:33 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 721.015324][T27459] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 721.034782][T27459] loop2: partition table partially beyond EOD, truncated 16:55:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() r9 = getuid() stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, r9, r10, 0x160}, 0x6, 0x9, 0x5}) 16:55:33 executing program 4: syz_read_part_table(0x74, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 721.069182][T27459] loop2: p1 start 1 is beyond EOD, truncated [ 721.092584][T27459] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 721.123858][T27459] loop2: p3 size 2 extends beyond EOD, truncated [ 721.158089][T27459] loop2: p4 size 32768 extends beyond EOD, truncated 16:55:33 executing program 3: syz_read_part_table(0xa, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:33 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) sysinfo(&(0x7f0000000140)=""/240) [ 721.183325][T27459] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 721.211956][T27459] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() r9 = getuid() stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, r9, r10, 0x160}, 0x6, 0x9, 0x5}) 16:55:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)=""/36}], 0x1) 16:55:34 executing program 2: syz_read_part_table(0x4c, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:34 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 721.753905][T27499] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 721.760819][T27499] loop4: partition table partially beyond EOD, truncated [ 721.785592][T27499] loop4: p1 start 1 is beyond EOD, truncated [ 721.840117][T27499] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:55:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() r9 = getuid() semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, r9, 0x0, 0x160}, 0x6, 0x9, 0x5}) [ 721.895057][T27499] loop4: p3 size 2 extends beyond EOD, truncated [ 721.928454][T27499] loop4: p4 size 32768 extends beyond EOD, truncated 16:55:34 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 16:55:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0xfffffffffffffd58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x401, 0xbe705417d4861bc2) write$P9_RLERROR(r2, &(0x7f00000000c0)={0x20, 0x7, 0x1, {0x17, 'cryptd(sha224-generic)\x00'}}, 0x20) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) socketpair(0x11, 0x5, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RWSTAT(r5, &(0x7f0000000140)={0x7, 0x7f, 0x2}, 0x7) r6 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x80800) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000240)={r6}) [ 721.958290][T27504] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 721.963732][T27499] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 722.011763][T27504] loop3: partition table partially beyond EOD, truncated [ 722.085095][T27529] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 722.099386][T27529] loop2: partition table partially beyond EOD, truncated 16:55:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() r9 = getuid() semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, r9, 0x0, 0x160}, 0x6, 0x9, 0x5}) [ 722.145929][T27499] loop4: p6 size 32768 extends beyond EOD, truncated [ 722.151407][T27529] loop2: p1 start 1 is beyond EOD, truncated [ 722.152832][T27504] loop3: p1 start 1 is beyond EOD, truncated [ 722.197470][T27529] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 722.215724][T27504] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 722.229488][T27529] loop2: p3 size 2 extends beyond EOD, truncated [ 722.242932][T27504] loop3: p3 size 2 extends beyond EOD, truncated [ 722.257946][T27529] loop2: p4 size 32768 extends beyond EOD, truncated [ 722.266586][T27504] loop3: p4 size 32768 extends beyond EOD, truncated 16:55:34 executing program 4: syz_read_part_table(0x7a, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 722.317901][T27529] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 722.335271][T27529] loop2: p6 size 32768 extends beyond EOD, truncated [ 722.382357][T27504] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 722.392989][T27504] loop3: p6 size 32768 extends beyond EOD, truncated 16:55:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() r9 = getuid() semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, r9, 0x0, 0x160}, 0x6, 0x9, 0x5}) 16:55:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000000)) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000080)=0x1, 0x4) 16:55:34 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 16:55:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() r9 = getuid() semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, r9, 0x0, 0x160}, 0x6, 0x9, 0x5}) [ 722.508320][T27551] print_req_error: 1 callbacks suppressed [ 722.508343][T27551] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 722.550180][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 722.561323][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 722.569993][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 722.580926][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 722.598291][T27552] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 722.611293][ T7585] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 722.628129][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 722.639127][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 722.649691][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 722.660678][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 722.669132][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 722.680060][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 722.690862][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 722.701618][T27567] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 722.701962][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 722.721761][ T2504] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 722.732699][ T2504] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 722.741396][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read 16:55:35 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) [ 722.749783][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 722.757985][ T2503] Buffer I/O error on dev loop4p2, logical block 0, async page read 16:55:35 executing program 2: syz_read_part_table(0x60, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) readv(r1, &(0x7f0000000100), 0x0) 16:55:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, 0x0, r9, 0x160}, 0x6, 0x9, 0x5}) 16:55:35 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 16:55:35 executing program 5: syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xcd00410}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x10}, 0x400) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) ioctl$sock_netdev_private(r5, 0x89f5, &(0x7f0000000140)="3381eda1a5c790b849f1cd6a0da1d32b69cf5a1e0feac33e7ac333032a7ea1a6994e31a273c709e63660b701f305ca1d00364a96b55ddc1e2e29e5724e069fc282") r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = accept4(r6, 0x0, 0x0, 0x80800) readv(r7, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 723.436889][T27575] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 723.475935][T27605] Dev loop3: unable to read RDB block 1 [ 723.480530][T27575] loop4: partition table partially beyond EOD, truncated [ 723.487333][T27605] loop3: unable to read partition table [ 723.506470][T27605] loop3: partition table beyond EOD, truncated [ 723.525106][T27575] loop4: p1 start 1 is beyond EOD, truncated [ 723.529342][T27605] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 723.531313][T27575] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 723.551217][T27575] loop4: p3 size 2 extends beyond EOD, truncated [ 723.565352][T27598] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 723.574919][T27575] loop4: p4 size 32768 extends beyond EOD, truncated [ 723.597179][T27598] loop2: partition table partially beyond EOD, truncated [ 723.604472][T27575] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 723.618498][T27598] loop2: p1 start 1 is beyond EOD, truncated [ 723.632121][T27575] loop4: p6 size 32768 extends beyond EOD, truncated [ 723.639335][T27598] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 723.676425][T27598] loop2: p3 size 2 extends beyond EOD, truncated [ 723.692493][T27598] loop2: p4 size 32768 extends beyond EOD, truncated [ 723.702315][T27598] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 723.725322][T27598] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:36 executing program 4: syz_read_part_table(0x90, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) r8 = getegid() stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, r8, 0x0, r9, 0x160}, 0x6, 0x9, 0x5}) 16:55:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80200, 0xa0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$x25(r4, &(0x7f0000000200)={0x9, @remote={[], 0x0}}, 0x12) fstat(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r6) setresgid(0x0, 0x0, r6) write$FUSE_ENTRY(r2, &(0x7f0000000140)={0x90, 0xb, 0x8, {0x2, 0x0, 0x4, 0xffffffff, 0x2, 0x3ff, {0x2, 0x1, 0xb8, 0x0, 0xfffffffffffffff9, 0x8, 0x7, 0x979, 0x9, 0x4, 0x0, r5, r6, 0x4, 0x7fffffff}}}, 0x90) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:36 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:36 executing program 5: syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 723.988251][T27598] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 724.300924][T27657] FAULT_INJECTION: forcing a failure. [ 724.300924][T27657] name failslab, interval 1, probability 0, space 0, times 0 16:55:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r7, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, 0x0, 0x0, r8, 0x160}, 0x6, 0x9, 0x5}) [ 724.402091][T27657] CPU: 0 PID: 27657 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 724.410484][T27657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.420552][T27657] Call Trace: [ 724.423913][T27657] dump_stack+0x11d/0x181 [ 724.428290][T27657] should_fail.cold+0xa/0x1a [ 724.432929][T27657] __should_failslab+0xee/0x130 [ 724.437819][T27657] should_failslab+0x9/0x14 [ 724.442458][T27657] kmem_cache_alloc_node+0x39/0x660 [ 724.447670][T27657] ? __read_once_size+0x41/0xe0 [ 724.452554][T27657] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.458817][T27657] __alloc_skb+0x8e/0x360 [ 724.463174][T27657] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 724.469137][T27657] __ip6_append_data.isra.0+0x1c9f/0x2070 [ 724.475427][T27657] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 724.481353][T27657] ? rawv6_bind+0x4c0/0x4c0 [ 724.485908][T27657] ip6_append_data+0x17b/0x250 [ 724.490701][T27657] ? rawv6_bind+0x4c0/0x4c0 [ 724.495223][T27657] ? rawv6_bind+0x4c0/0x4c0 [ 724.499741][T27657] rawv6_sendmsg+0xf63/0x21e0 [ 724.504445][T27657] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 724.510714][T27657] ? tomoyo_check_acl+0x161/0x270 [ 724.515758][T27657] ? __const_udelay+0x36/0x40 [ 724.520553][T27657] ? __udelay+0x10/0x20 [ 724.524740][T27657] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.530994][T27657] ? aa_label_sk_perm+0x89/0xe0 [ 724.536250][T27657] inet_sendmsg+0x6d/0x90 [ 724.540620][T27657] ? inet_sendmsg+0x6d/0x90 [ 724.545171][T27657] ? inet_send_prepare+0x200/0x200 [ 724.550382][T27657] sock_sendmsg+0x9f/0xc0 [ 724.554723][T27657] __sys_sendto+0x21f/0x320 [ 724.559313][T27657] ? constant_test_bit+0x12/0x30 [ 724.564311][T27657] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.570736][T27657] ? syscall_trace_enter+0x315/0x740 [ 724.576043][T27657] __x64_sys_sendto+0x89/0xb0 [ 724.580842][T27657] do_syscall_64+0xcc/0x370 [ 724.585363][T27657] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 724.591365][T27657] RIP: 0033:0x45a679 [ 724.595286][T27657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 724.614892][T27657] RSP: 002b:00007f38b0581c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 724.623314][T27657] RAX: ffffffffffffffda RBX: 00007f38b0581c90 RCX: 000000000045a679 [ 724.631285][T27657] RDX: 000000000000ffa7 RSI: 0000000020000000 RDI: 0000000000000003 [ 724.639263][T27657] RBP: 000000000075bf20 R08: 0000000020000180 R09: 000000000000001c 16:55:37 executing program 2: syz_read_part_table(0x68, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000080)=0x2, 0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000180), 0xb2413d4bf9acb0d5) 16:55:37 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 724.647222][T27657] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b05826d4 [ 724.655180][T27657] R13: 00000000004c8eb3 R14: 00000000004dfe18 R15: 0000000000000004 [ 724.745093][T27652] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 724.784844][T27652] loop4: partition table partially beyond EOD, truncated [ 724.799620][T27674] FAULT_INJECTION: forcing a failure. [ 724.799620][T27674] name failslab, interval 1, probability 0, space 0, times 0 [ 724.827638][T27652] loop4: p1 start 1 is beyond EOD, truncated [ 724.859172][T27652] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 724.884776][T27674] CPU: 0 PID: 27674 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 724.893384][T27674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.903538][T27674] Call Trace: [ 724.906839][T27674] dump_stack+0x11d/0x181 [ 724.911193][T27674] should_fail.cold+0xa/0x1a [ 724.915806][T27674] __should_failslab+0xee/0x130 [ 724.920683][T27674] should_failslab+0x9/0x14 [ 724.925196][T27674] kmem_cache_alloc_node_trace+0x3b/0x670 [ 724.930948][T27674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.937258][T27674] ? memcg_kmem_put_cache+0x91/0xe0 [ 724.942465][T27674] __kmalloc_node_track_caller+0x38/0x50 [ 724.948107][T27674] __kmalloc_reserve.isra.0+0x49/0xd0 [ 724.953489][T27674] __alloc_skb+0xc2/0x360 [ 724.957955][T27674] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 724.963890][T27674] __ip6_append_data.isra.0+0x1c9f/0x2070 [ 724.969670][T27674] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 724.975737][T27674] ? rawv6_bind+0x4c0/0x4c0 [ 724.980442][T27674] ip6_append_data+0x17b/0x250 [ 724.985328][T27674] ? rawv6_bind+0x4c0/0x4c0 [ 724.989942][T27674] ? rawv6_bind+0x4c0/0x4c0 [ 724.994471][T27674] rawv6_sendmsg+0xf63/0x21e0 [ 724.999230][T27674] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 725.005536][T27674] ? tomoyo_check_acl+0x161/0x270 [ 725.010946][T27674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.017251][T27674] ? aa_label_sk_perm+0x89/0xe0 [ 725.025002][T27674] inet_sendmsg+0x6d/0x90 [ 725.029338][T27674] ? inet_sendmsg+0x6d/0x90 [ 725.034044][T27674] ? inet_send_prepare+0x200/0x200 [ 725.039177][T27674] sock_sendmsg+0x9f/0xc0 [ 725.043511][T27674] __sys_sendto+0x21f/0x320 [ 725.048121][T27674] ? constant_test_bit+0x12/0x30 [ 725.053061][T27674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.059345][T27674] ? syscall_trace_enter+0x315/0x740 [ 725.064717][T27674] __x64_sys_sendto+0x89/0xb0 [ 725.069851][T27674] do_syscall_64+0xcc/0x370 [ 725.075131][T27674] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 725.081108][T27674] RIP: 0033:0x45a679 [ 725.085375][T27674] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.105482][T27674] RSP: 002b:00007f38b0581c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 725.114175][T27674] RAX: ffffffffffffffda RBX: 00007f38b0581c90 RCX: 000000000045a679 [ 725.125952][T27674] RDX: 000000000000ffa7 RSI: 0000000020000000 RDI: 0000000000000003 [ 725.136467][T27674] RBP: 000000000075bf20 R08: 0000000020000180 R09: 000000000000001c [ 725.144456][T27674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b05826d4 [ 725.152836][T27674] R13: 00000000004c8eb3 R14: 00000000004dfe18 R15: 0000000000000004 [ 725.171911][T27652] loop4: p3 size 2 extends beyond EOD, truncated 16:55:37 executing program 5: syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, 0x0, 0x0, r8, 0x160}, 0x6, 0x9, 0x5}) 16:55:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000080)={0x7, 'veth0_to_bond\x00', {0x3}, 0x6}) [ 725.303531][T27652] loop4: p4 size 32768 extends beyond EOD, truncated [ 725.366418][T27652] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 725.380622][T27675] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 725.395331][T27675] loop2: partition table partially beyond EOD, truncated [ 725.423125][T27675] loop2: p1 start 1 is beyond EOD, truncated [ 725.425915][T27652] loop4: p6 size 32768 extends beyond EOD, truncated [ 725.450047][T27675] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 725.555439][T27675] loop2: p3 size 2 extends beyond EOD, truncated [ 725.579646][T27675] loop2: p4 size 32768 extends beyond EOD, truncated 16:55:38 executing program 4: syz_read_part_table(0x300, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:38 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, 0x0, 0x0, r8, 0x160}, 0x6, 0x9, 0x5}) 16:55:38 executing program 1: r0 = socket$inet(0x2, 0x800, 0x7) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r2, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r2, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x10}}}, 0x3, 0x0, 0x4e1, 0x40, 0xe8}, &(0x7f0000000000)=0x98) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 725.628838][T27675] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 725.690151][T27675] loop2: p6 size 32768 extends beyond EOD, truncated [ 725.718531][T27705] FAULT_INJECTION: forcing a failure. [ 725.718531][T27705] name failslab, interval 1, probability 0, space 0, times 0 16:55:38 executing program 5: syz_read_part_table(0x90, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 725.955558][T27705] CPU: 0 PID: 27705 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 725.963917][T27705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.974002][T27705] Call Trace: [ 725.974039][T27705] dump_stack+0x11d/0x181 [ 725.982358][T27705] should_fail.cold+0xa/0x1a [ 725.987020][T27705] __should_failslab+0xee/0x130 [ 725.992012][T27705] should_failslab+0x9/0x14 [ 725.996718][T27705] kmem_cache_alloc_node+0x39/0x660 16:55:38 executing program 2: syz_read_part_table(0x6c, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 726.001972][T27705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.008230][T27705] ? ip_generic_getfrag+0xae/0x190 [ 726.013354][T27705] __alloc_skb+0x8e/0x360 [ 726.018214][T27705] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 726.024239][T27705] __ip6_append_data.isra.0+0x1c9f/0x2070 [ 726.030142][T27705] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 726.036038][T27705] ? rawv6_bind+0x4c0/0x4c0 [ 726.040560][T27705] ip6_append_data+0x17b/0x250 [ 726.045493][T27705] ? rawv6_bind+0x4c0/0x4c0 [ 726.050013][T27705] ? rawv6_bind+0x4c0/0x4c0 [ 726.054560][T27705] rawv6_sendmsg+0xf63/0x21e0 [ 726.059246][T27705] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 726.065781][T27705] ? tomoyo_check_acl+0x161/0x270 [ 726.070927][T27705] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.077621][T27705] ? aa_label_sk_perm+0x89/0xe0 [ 726.084409][T27705] inet_sendmsg+0x6d/0x90 [ 726.088786][T27705] ? inet_sendmsg+0x6d/0x90 [ 726.093307][T27705] ? inet_send_prepare+0x200/0x200 [ 726.098533][T27705] sock_sendmsg+0x9f/0xc0 [ 726.102936][T27705] __sys_sendto+0x21f/0x320 [ 726.107598][T27705] ? __read_once_size.constprop.0+0x12/0x20 [ 726.113595][T27705] ? constant_test_bit+0x12/0x30 [ 726.113614][T27705] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.113641][T27705] ? syscall_trace_enter+0x315/0x740 [ 726.130466][T27705] ? fput+0x29/0x30 [ 726.134286][T27705] __x64_sys_sendto+0x89/0xb0 [ 726.138991][T27705] do_syscall_64+0xcc/0x370 [ 726.143510][T27705] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.149406][T27705] RIP: 0033:0x45a679 16:55:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/tcp\x00') r4 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r5, 0x0) ioctl$TUNSETOWNER(r3, 0x400454cc, r5) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/37, 0x25}], 0x230) [ 726.153318][T27705] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.173007][T27705] RSP: 002b:00007f38b0581c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 726.181432][T27705] RAX: ffffffffffffffda RBX: 00007f38b0581c90 RCX: 000000000045a679 [ 726.189424][T27705] RDX: 000000000000ffa7 RSI: 0000000020000000 RDI: 0000000000000003 [ 726.197409][T27705] RBP: 000000000075bf20 R08: 0000000020000180 R09: 000000000000001c 16:55:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, r7, 0x0, 0x0, r8, 0x160}, 0x6, 0x9, 0x5}) [ 726.205379][T27705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b05826d4 [ 726.213353][T27705] R13: 00000000004c8eb3 R14: 00000000004dfe18 R15: 0000000000000004 16:55:38 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 726.364853][T27717] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 726.387046][T27717] loop4: partition table partially beyond EOD, truncated [ 726.437520][T27717] loop4: p1 start 1 is beyond EOD, truncated [ 726.457402][T27717] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 726.523567][T27717] loop4: p3 size 2 extends beyond EOD, truncated [ 726.557391][T27717] loop4: p4 size 32768 extends beyond EOD, truncated [ 726.580815][T27752] FAULT_INJECTION: forcing a failure. [ 726.580815][T27752] name failslab, interval 1, probability 0, space 0, times 0 [ 726.596396][T27734] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 726.598305][T27717] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 726.602173][T27734] loop2: partition table partially beyond EOD, truncated [ 726.617247][T27752] CPU: 0 PID: 27752 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 16:55:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) accept$alg(r0, 0x0, 0x0) [ 726.625575][T27752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.635644][T27752] Call Trace: [ 726.638941][T27752] dump_stack+0x11d/0x181 [ 726.643295][T27752] should_fail.cold+0xa/0x1a [ 726.643541][T27734] loop2: p1 start 1 is beyond EOD, truncated [ 726.647897][T27752] __should_failslab+0xee/0x130 [ 726.647919][T27752] should_failslab+0x9/0x14 [ 726.647935][T27752] kmem_cache_alloc_node_trace+0x3b/0x670 [ 726.648037][T27752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.661394][T27734] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 726.663263][T27752] ? memcg_kmem_put_cache+0x91/0xe0 [ 726.663288][T27752] __kmalloc_node_track_caller+0x38/0x50 [ 726.693226][T27752] __kmalloc_reserve.isra.0+0x49/0xd0 [ 726.698649][T27752] __alloc_skb+0xc2/0x360 [ 726.703089][T27752] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 726.709065][T27752] __ip6_append_data.isra.0+0x1c9f/0x2070 [ 726.714794][T27752] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 726.720684][T27752] ? rawv6_bind+0x4c0/0x4c0 [ 726.725201][T27752] ip6_append_data+0x17b/0x250 [ 726.729975][T27752] ? rawv6_bind+0x4c0/0x4c0 [ 726.734571][T27752] ? rawv6_bind+0x4c0/0x4c0 [ 726.739140][T27752] rawv6_sendmsg+0xf63/0x21e0 [ 726.743851][T27752] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 726.750340][T27752] ? tomoyo_check_acl+0x161/0x270 [ 726.752166][T27717] loop4: p6 size 32768 extends beyond EOD, truncated [ 726.755392][T27752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.755414][T27752] ? aa_label_sk_perm+0x89/0xe0 [ 726.755451][T27752] inet_sendmsg+0x6d/0x90 [ 726.764934][T27734] loop2: p3 size 2 extends beyond EOD, truncated [ 726.768337][T27752] ? inet_sendmsg+0x6d/0x90 [ 726.768353][T27752] ? inet_send_prepare+0x200/0x200 [ 726.768368][T27752] sock_sendmsg+0x9f/0xc0 [ 726.768456][T27752] __sys_sendto+0x21f/0x320 [ 726.802252][T27752] ? constant_test_bit+0x12/0x30 [ 726.807221][T27752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.813459][T27752] ? syscall_trace_enter+0x315/0x740 [ 726.818771][T27752] __x64_sys_sendto+0x89/0xb0 [ 726.823520][T27752] do_syscall_64+0xcc/0x370 [ 726.828074][T27752] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.833998][T27752] RIP: 0033:0x45a679 [ 726.837966][T27752] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.857555][T27752] RSP: 002b:00007f38b0581c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 726.865971][T27752] RAX: ffffffffffffffda RBX: 00007f38b0581c90 RCX: 000000000045a679 [ 726.873926][T27752] RDX: 000000000000ffa7 RSI: 0000000020000000 RDI: 0000000000000003 16:55:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) socket(0x0, 0x2, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r6, 0x160}, 0x6, 0x9, 0x5}) [ 726.881890][T27752] RBP: 000000000075bf20 R08: 0000000020000180 R09: 000000000000001c [ 726.889935][T27752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b05826d4 [ 726.897903][T27752] R13: 00000000004c8eb3 R14: 00000000004dfe18 R15: 0000000000000004 [ 726.915273][T27734] loop2: p4 size 32768 extends beyond EOD, truncated [ 726.955134][T27734] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:55:39 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 727.012594][T27734] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:39 executing program 4: syz_read_part_table(0x500, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:39 executing program 5: syz_read_part_table(0x300, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r6, 0x160}, 0x6, 0x9, 0x5}) [ 727.300141][T27780] FAULT_INJECTION: forcing a failure. [ 727.300141][T27780] name failslab, interval 1, probability 0, space 0, times 0 [ 727.313007][T27780] CPU: 0 PID: 27780 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 727.321328][T27780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.331383][T27780] Call Trace: [ 727.334754][T27780] dump_stack+0x11d/0x181 [ 727.339164][T27780] should_fail.cold+0xa/0x1a [ 727.343762][T27780] __should_failslab+0xee/0x130 16:55:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 727.348700][T27780] should_failslab+0x9/0x14 [ 727.353218][T27780] kmem_cache_alloc_node+0x39/0x660 [ 727.358429][T27780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.364682][T27780] ? ip_generic_getfrag+0xae/0x190 [ 727.369793][T27780] __alloc_skb+0x8e/0x360 [ 727.374240][T27780] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 727.380120][T27780] __ip6_append_data.isra.0+0x1c9f/0x2070 [ 727.385835][T27780] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 727.391715][T27780] ? rawv6_bind+0x4c0/0x4c0 [ 727.396223][T27780] ip6_append_data+0x17b/0x250 [ 727.400974][T27780] ? rawv6_bind+0x4c0/0x4c0 [ 727.405468][T27780] ? rawv6_bind+0x4c0/0x4c0 [ 727.410075][T27780] rawv6_sendmsg+0xf63/0x21e0 [ 727.414749][T27780] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 727.420984][T27780] ? tomoyo_check_acl+0x161/0x270 [ 727.426001][T27780] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.432224][T27780] ? aa_label_sk_perm+0x89/0xe0 [ 727.437074][T27780] inet_sendmsg+0x6d/0x90 [ 727.441393][T27780] ? inet_sendmsg+0x6d/0x90 [ 727.445896][T27780] ? inet_send_prepare+0x200/0x200 [ 727.451045][T27780] sock_sendmsg+0x9f/0xc0 [ 727.455364][T27780] __sys_sendto+0x21f/0x320 [ 727.459874][T27780] ? constant_test_bit+0x12/0x30 [ 727.464812][T27780] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.471033][T27780] ? syscall_trace_enter+0x315/0x740 [ 727.476372][T27780] __x64_sys_sendto+0x89/0xb0 [ 727.481044][T27780] do_syscall_64+0xcc/0x370 [ 727.485633][T27780] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 727.491513][T27780] RIP: 0033:0x45a679 [ 727.495575][T27780] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 727.515260][T27780] RSP: 002b:00007f38b0581c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 727.523667][T27780] RAX: ffffffffffffffda RBX: 00007f38b0581c90 RCX: 000000000045a679 [ 727.531619][T27780] RDX: 000000000000ffa7 RSI: 0000000020000000 RDI: 0000000000000003 [ 727.539661][T27780] RBP: 000000000075bf20 R08: 0000000020000180 R09: 000000000000001c 16:55:39 executing program 2: syz_read_part_table(0x74, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:40 executing program 3 (fault-call:1 fault-nth:5): r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 727.547611][T27780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b05826d4 [ 727.555566][T27780] R13: 00000000004c8eb3 R14: 00000000004dfe18 R15: 0000000000000004 [ 727.725188][T27779] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 727.730462][T27779] loop4: partition table partially beyond EOD, truncated 16:55:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/50, 0x32}], 0x1) [ 727.780525][T27779] loop4: p1 size 2 extends beyond EOD, truncated 16:55:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = semget(0x0, 0x1, 0x1e3d43dbdf7c2ad8) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r6, 0x160}, 0x6, 0x9, 0x5}) [ 727.822419][T27779] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 727.839689][T27796] FAULT_INJECTION: forcing a failure. [ 727.839689][T27796] name failslab, interval 1, probability 0, space 0, times 0 [ 727.855472][T27779] loop4: p4 size 32768 extends beyond EOD, truncated [ 727.893573][T27779] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 727.934831][T27779] loop4: p6 size 32768 extends beyond EOD, truncated [ 727.957562][T27796] CPU: 0 PID: 27796 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 727.965946][T27796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.976005][T27796] Call Trace: [ 727.979300][T27796] dump_stack+0x11d/0x181 [ 727.983647][T27796] should_fail.cold+0xa/0x1a [ 727.988319][T27796] __should_failslab+0xee/0x130 [ 727.993186][T27796] should_failslab+0x9/0x14 [ 727.997696][T27796] kmem_cache_alloc_node_trace+0x3b/0x670 [ 728.003494][T27796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.009822][T27796] ? memcg_kmem_put_cache+0x91/0xe0 [ 728.015034][T27796] __kmalloc_node_track_caller+0x38/0x50 [ 728.020701][T27796] __kmalloc_reserve.isra.0+0x49/0xd0 [ 728.026074][T27796] __alloc_skb+0xc2/0x360 [ 728.030466][T27796] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 728.036383][T27796] __ip6_append_data.isra.0+0x1c9f/0x2070 [ 728.042114][T27796] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 728.048005][T27796] ? rawv6_bind+0x4c0/0x4c0 [ 728.052602][T27796] ip6_append_data+0x17b/0x250 [ 728.057365][T27796] ? rawv6_bind+0x4c0/0x4c0 [ 728.061871][T27796] ? rawv6_bind+0x4c0/0x4c0 [ 728.066425][T27796] rawv6_sendmsg+0xf63/0x21e0 [ 728.071094][T27796] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 728.077355][T27796] ? tomoyo_check_acl+0x161/0x270 [ 728.082423][T27796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.088654][T27796] ? aa_label_sk_perm+0x89/0xe0 [ 728.093520][T27796] inet_sendmsg+0x6d/0x90 [ 728.097840][T27796] ? inet_sendmsg+0x6d/0x90 [ 728.102334][T27796] ? inet_send_prepare+0x200/0x200 [ 728.107550][T27796] sock_sendmsg+0x9f/0xc0 [ 728.111870][T27796] __sys_sendto+0x21f/0x320 [ 728.116381][T27796] ? constant_test_bit+0x12/0x30 [ 728.121358][T27796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.127607][T27796] ? syscall_trace_enter+0x315/0x740 [ 728.132890][T27796] __x64_sys_sendto+0x89/0xb0 [ 728.137571][T27796] do_syscall_64+0xcc/0x370 [ 728.142073][T27796] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 728.147961][T27796] RIP: 0033:0x45a679 [ 728.151906][T27796] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 728.171662][T27796] RSP: 002b:00007f38b0581c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 728.180137][T27796] RAX: ffffffffffffffda RBX: 00007f38b0581c90 RCX: 000000000045a679 [ 728.188097][T27796] RDX: 000000000000ffa7 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.196094][T27796] RBP: 000000000075bf20 R08: 0000000020000180 R09: 000000000000001c [ 728.204053][T27796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b05826d4 [ 728.212031][T27796] R13: 00000000004c8eb3 R14: 00000000004dfe18 R15: 0000000000000004 16:55:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x1e) socket$pppoe(0x18, 0x1, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x800) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:40 executing program 5: syz_read_part_table(0x7a, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 728.345173][T27793] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 728.355002][T27793] loop2: partition table partially beyond EOD, truncated 16:55:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r5, 0x160}, 0x6, 0x9, 0x5}) [ 728.388295][T27793] loop2: p1 start 1 is beyond EOD, truncated [ 728.398691][T27793] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 728.423449][T27793] loop2: p3 size 2 extends beyond EOD, truncated [ 728.446235][T27793] loop2: p4 size 32768 extends beyond EOD, truncated [ 728.498385][T27793] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 728.535231][T27793] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:41 executing program 4: syz_read_part_table(0x600, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:41 executing program 3 (fault-call:1 fault-nth:6): r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000200)={0x8, 0x3, 0x5, 0x0, 0xffff, 0xa1, 0x1, 0x81, 0x6, 0x2e, 0xfa, 0x3c, 0x0, 0x20, 0x4, 0x1, 0x0, 0x3f, 0x5}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20408000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRESDEC=r6, @ANYBLOB="080029bd7000fddbdf251200000020000200040004000400040008000100070000000400040008000200adb50000003a020009000000080002000600000014000200080002003f000000040004000400040000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4012}, 0x40) r7 = accept4(r2, 0x0, 0x0, 0x0) readv(r7, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) accept4(r0, 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r4, 0x160}, 0x6, 0x9, 0x5}) 16:55:41 executing program 2: syz_read_part_table(0x7a, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:41 executing program 5 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:41 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) accept4(r0, 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r4, 0x160}, 0x6, 0x9, 0x5}) 16:55:41 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 729.082266][T27851] FAULT_INJECTION: forcing a failure. [ 729.082266][T27851] name failslab, interval 1, probability 0, space 0, times 0 [ 729.164842][T27851] CPU: 1 PID: 27851 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 729.173283][T27851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.183525][T27851] Call Trace: [ 729.186855][T27851] dump_stack+0x11d/0x181 [ 729.191234][T27851] should_fail.cold+0xa/0x1a [ 729.195871][T27851] __should_failslab+0xee/0x130 [ 729.200814][T27851] should_failslab+0x9/0x14 [ 729.205319][T27851] __kmalloc+0x53/0x690 [ 729.209548][T27851] ? constant_test_bit+0x12/0x30 [ 729.214555][T27851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.220798][T27851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.227041][T27851] ? strnlen_user+0x1a8/0x220 [ 729.231745][T27851] ? __x64_sys_memfd_create+0xdb/0x370 [ 729.237197][T27851] __x64_sys_memfd_create+0xdb/0x370 [ 729.242788][T27851] do_syscall_64+0xcc/0x370 [ 729.247304][T27851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 729.253875][T27851] RIP: 0033:0x45a679 [ 729.257777][T27851] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 729.277386][T27851] RSP: 002b:00007f405ce2d9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 729.285804][T27851] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 729.293796][T27851] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 729.301829][T27851] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 729.309829][T27851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f405ce2e6d4 [ 729.317830][T27851] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 16:55:41 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x2, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) 16:55:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r4, 0x160}, 0x6, 0x9, 0x5}) [ 729.395398][T27847] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 729.402993][T27847] loop2: partition table partially beyond EOD, truncated [ 729.426279][T27847] loop2: p1 start 1 is beyond EOD, truncated [ 729.433915][T27847] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 729.444223][T27853] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 729.461521][T27847] loop2: p3 size 2 extends beyond EOD, truncated [ 729.474183][T27853] loop4: partition table partially beyond EOD, truncated [ 729.474635][T27847] loop2: p4 size 32768 extends beyond EOD, truncated [ 729.500591][T27853] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 729.541646][T27853] loop4: p4 size 32768 extends beyond EOD, truncated [ 729.565218][T27853] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 729.576059][T27847] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 729.611756][T27847] loop2: p6 size 32768 extends beyond EOD, truncated [ 729.611814][T27853] loop4: p6 size 32768 extends beyond EOD, truncated [ 729.801873][T27847] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 729.801939][T27882] print_req_error: 100 callbacks suppressed [ 729.801966][T27882] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 729.899293][T27887] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 729.904818][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 729.921834][ T2503] buffer_io_error: 90 callbacks suppressed [ 729.921846][ T2503] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 729.932630][T27886] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 16:55:42 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x598, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:42 executing program 5 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x2, 0x36c, [0x0, 0x20000300, 0x20000330, 0x2000049e], 0x0, &(0x7f0000000140), &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x0, 0x1, 0xe50, 'hwsim0\x00', 'vxcan1\x00', 'ip_vti0\x00', 'veth1_to_bridge\x00', @random="f065136db1e0", [0x0, 0x1fe, 0x154ede172420629f, 0x0, 0xff], @dev={[], 0x14}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0xae, 0x10e, 0x13e, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x3, 0x0, 0x2}}}], [@common=@STANDARD={'\x00', 0x8, {0x7ffffffffffffffc}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xffc0}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{0x11, 0xa, 0x18, 'hsr0\x00', 'vcan0\x00', 'veth1_to_team\x00', 'irlan0\x00', @broadcast, [0x7f, 0xff, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff], 0x106, 0x136, 0x16e, [@physdev={'physdev\x00', 0x70, {{'gretap0\x00', {}, 'gretap0\x00', {}, 0x7, 0x10}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x401}}}], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffd}}}}]}]}, 0x3e4) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000680)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r7, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x3c, r8, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01009b00", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e1d, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r11, 0x40305828, &(0x7f0000000780)={0x0, 0x3, 0xffffffffffffff01}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f00000000c0)={r9, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000080)={r9}, &(0x7f00000000c0)=0x8) 16:55:42 executing program 4: syz_read_part_table(0x700, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 729.939049][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 729.958351][ T2503] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 729.969638][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 729.980533][ T2503] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 730.016073][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 730.027034][ T2504] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 730.035321][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 730.046241][ T2504] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 730.047162][T27894] FAULT_INJECTION: forcing a failure. 16:55:42 executing program 2: syz_read_part_table(0x90, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r3, 0x160}, 0x6, 0x9, 0x5}) [ 730.047162][T27894] name failslab, interval 1, probability 0, space 0, times 0 [ 730.054404][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 730.078097][ T2504] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 730.086213][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 730.097264][ T2504] Buffer I/O error on dev loop2p2, logical block 0, async page read [ 730.105340][ T2504] Buffer I/O error on dev loop2p4, logical block 0, async page read 16:55:42 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x5a0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 730.105373][ T2504] Buffer I/O error on dev loop2p3, logical block 0, async page read 16:55:42 executing program 5 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r3, 0x160}, 0x6, 0x9, 0x5}) [ 730.105600][ T2503] Buffer I/O error on dev loop2p2, logical block 0, async page read [ 730.153107][T27894] CPU: 1 PID: 27894 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 730.153173][T27894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:55:42 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x5c8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 730.153179][T27894] Call Trace: [ 730.153210][T27894] dump_stack+0x11d/0x181 [ 730.153233][T27894] should_fail.cold+0xa/0x1a [ 730.153374][T27894] __should_failslab+0xee/0x130 16:55:43 executing program 5 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 730.153400][T27894] should_failslab+0x9/0x14 [ 730.153419][T27894] kmem_cache_alloc+0x29/0x5d0 [ 730.153442][T27894] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 730.153499][T27894] ? _kstrtoull+0xfc/0x130 [ 730.153585][T27894] ? shmem_destroy_inode+0x70/0x70 [ 730.153606][T27894] shmem_alloc_inode+0x31/0x60 [ 730.153626][T27894] alloc_inode+0x48/0x130 [ 730.153742][T27894] new_inode_pseudo+0x35/0xe0 [ 730.153764][T27894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 730.153786][T27894] new_inode+0x28/0x50 [ 730.153828][T27894] shmem_get_inode+0x85/0x490 [ 730.153844][T27894] ? _raw_spin_unlock+0x4b/0x60 [ 730.153867][T27894] __shmem_file_setup.part.0+0x6f/0x1f0 [ 730.153891][T27894] shmem_file_setup+0x7b/0xa0 [ 730.153946][T27894] __x64_sys_memfd_create+0x20d/0x370 [ 730.153970][T27894] do_syscall_64+0xcc/0x370 [ 730.153990][T27894] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 730.154002][T27894] RIP: 0033:0x45a679 [ 730.154032][T27894] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.154042][T27894] RSP: 002b:00007f405ce2d9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 730.154059][T27894] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 730.154075][T27894] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 730.154086][T27894] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 730.154095][T27894] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f405ce2e6d4 [ 730.154105][T27894] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 [ 730.408318][T27912] FAULT_INJECTION: forcing a failure. [ 730.408318][T27912] name failslab, interval 1, probability 0, space 0, times 0 [ 730.408340][T27912] CPU: 0 PID: 27912 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 730.408349][T27912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.408355][T27912] Call Trace: [ 730.408426][T27912] dump_stack+0x11d/0x181 [ 730.408447][T27912] should_fail.cold+0xa/0x1a [ 730.408471][T27912] __should_failslab+0xee/0x130 [ 730.408493][T27912] should_failslab+0x9/0x14 [ 730.408509][T27912] kmem_cache_alloc+0x29/0x5d0 [ 730.408568][T27912] ? __write_once_size+0x5a/0xe0 [ 730.408600][T27912] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 730.408620][T27912] __d_alloc+0x52/0x4b0 [ 730.408636][T27912] ? timestamp_truncate+0x11b/0x160 [ 730.408652][T27912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.408675][T27912] d_alloc_pseudo+0x27/0x70 [ 730.408692][T27912] alloc_file_pseudo+0x96/0x1b0 [ 730.408795][T27912] __shmem_file_setup.part.0+0xd4/0x1f0 [ 730.408817][T27912] shmem_file_setup+0x7b/0xa0 [ 730.408840][T27912] __x64_sys_memfd_create+0x20d/0x370 [ 730.408864][T27912] do_syscall_64+0xcc/0x370 [ 730.408933][T27912] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 730.408946][T27912] RIP: 0033:0x45a679 [ 730.409036][T27912] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.409046][T27912] RSP: 002b:00007f405ce2d9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 730.409061][T27912] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 730.409072][T27912] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 730.409083][T27912] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 730.409093][T27912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f405ce2e6d4 [ 730.409104][T27912] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 [ 730.559618][T27901] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 730.645256][T27905] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 730.754262][T27930] FAULT_INJECTION: forcing a failure. [ 730.754262][T27930] name failslab, interval 1, probability 0, space 0, times 0 [ 730.791992][T27905] loop4: partition table partially beyond EOD, truncated [ 730.837861][T27930] CPU: 0 PID: 27930 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 730.850593][T27905] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 730.855249][T27930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.855254][T27930] Call Trace: [ 730.855279][T27930] dump_stack+0x11d/0x181 [ 730.855298][T27930] should_fail.cold+0xa/0x1a [ 730.855323][T27930] __should_failslab+0xee/0x130 [ 730.855343][T27930] should_failslab+0x9/0x14 [ 730.855393][T27930] kmem_cache_alloc+0x29/0x5d0 [ 730.861588][T27905] loop4: p4 size 32768 extends beyond EOD, truncated [ 730.866192][T27930] ? memcg_kmem_put_cache+0x91/0xe0 [ 730.866213][T27930] ? kmem_cache_alloc+0x1f3/0x5d0 [ 730.866233][T27930] __alloc_file+0x4d/0x210 [ 730.866304][T27930] alloc_empty_file+0x8f/0x180 [ 730.866399][T27930] alloc_file+0x4e/0x2b0 [ 730.871268][T27905] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 730.875715][T27930] ? _raw_spin_unlock+0x4b/0x60 [ 730.875804][T27930] alloc_file_pseudo+0x11c/0x1b0 [ 730.875834][T27930] __shmem_file_setup.part.0+0xd4/0x1f0 [ 730.882794][T27905] loop4: p6 size 32768 extends beyond EOD, truncated [ 730.886536][T27930] shmem_file_setup+0x7b/0xa0 16:55:43 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xb30, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r3, 0x160}, 0x6, 0x9, 0x5}) [ 730.886558][T27930] __x64_sys_memfd_create+0x20d/0x370 [ 730.886581][T27930] do_syscall_64+0xcc/0x370 [ 730.886614][T27930] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 731.153479][T27930] RIP: 0033:0x45a679 [ 731.153534][T27930] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.153541][T27930] RSP: 002b:00007f405ce2d9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 731.153556][T27930] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 [ 731.153610][T27930] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 731.153619][T27930] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 731.153627][T27930] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f405ce2e6d4 [ 731.153636][T27930] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 16:55:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_DROP_MASTER(r5, 0x641f) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000000)=0x1) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f00000000c0)={0x4, 0x4, 0x7fffffff, 0x9, 'syz1\x00', 0x3}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_CAP(r9, 0xc010640c, &(0x7f0000000080)={0x0, 0x80000000}) 16:55:43 executing program 4: syz_read_part_table(0x900, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:43 executing program 2: syz_read_part_table(0x300, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r3, 0x160}, 0x6, 0x9, 0x5}) 16:55:43 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x10c8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:44 executing program 5 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r3, 0x160}, 0x6, 0x9, 0x5}) 16:55:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0xfffffffffffffe03) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000080)=0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_GET_SREGS(r7, 0x8138ae83, &(0x7f0000000300)) socket$pppoe(0x18, 0x1, 0x0) [ 731.821463][T27967] FAULT_INJECTION: forcing a failure. [ 731.821463][T27967] name failslab, interval 1, probability 0, space 0, times 0 [ 731.872776][T27967] CPU: 1 PID: 27967 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 731.881178][T27967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.891241][T27967] Call Trace: [ 731.894549][T27967] dump_stack+0x11d/0x181 [ 731.898975][T27967] should_fail.cold+0xa/0x1a [ 731.903592][T27967] __should_failslab+0xee/0x130 [ 731.908495][T27967] should_failslab+0x9/0x14 [ 731.913007][T27967] kmem_cache_alloc+0x29/0x5d0 [ 731.917790][T27967] ? kmem_cache_alloc+0x1f3/0x5d0 [ 731.922859][T27967] ? memcg_kmem_put_cache+0x91/0xe0 [ 731.928124][T27967] security_file_alloc+0x48/0x110 [ 731.933136][T27967] __alloc_file+0xa3/0x210 [ 731.937621][T27967] alloc_empty_file+0x8f/0x180 [ 731.942369][T27967] alloc_file+0x4e/0x2b0 [ 731.946652][T27967] ? _raw_spin_unlock+0x4b/0x60 [ 731.951493][T27967] alloc_file_pseudo+0x11c/0x1b0 [ 731.956460][T27967] __shmem_file_setup.part.0+0xd4/0x1f0 [ 731.962042][T27967] shmem_file_setup+0x7b/0xa0 [ 731.966745][T27967] __x64_sys_memfd_create+0x20d/0x370 [ 731.972155][T27967] do_syscall_64+0xcc/0x370 [ 731.976653][T27967] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 731.982536][T27967] RIP: 0033:0x45a679 [ 731.986438][T27967] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.006089][T27967] RSP: 002b:00007f405ce2d9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 732.014502][T27967] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a679 16:55:44 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x1660, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 732.022461][T27967] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004bf487 [ 732.030418][T27967] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 732.038389][T27967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f405ce2e6d4 [ 732.046344][T27967] R13: 00000000004bf487 R14: 00000000004e2d88 R15: 0000000000000003 [ 732.067882][T27956] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 732.073116][T27956] loop2: partition table partially beyond EOD, truncated [ 732.091720][T27956] loop2: p1 start 1 is beyond EOD, truncated [ 732.101265][T27956] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:55:44 executing program 5 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 732.118269][T27956] loop2: p3 size 2 extends beyond EOD, truncated [ 732.125458][T27950] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 732.130854][T27950] loop4: partition table partially beyond EOD, truncated [ 732.197307][T27956] loop2: p4 size 32768 extends beyond EOD, truncated [ 732.207661][T27950] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 732.225743][T27956] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 732.251676][T27950] loop4: p4 size 32768 extends beyond EOD, truncated [ 732.259006][T27956] loop2: p6 size 32768 extends beyond EOD, truncated [ 732.271427][T27950] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 732.298011][T27950] loop4: p6 size 32768 extends beyond EOD, truncated [ 732.300170][T27984] FAULT_INJECTION: forcing a failure. [ 732.300170][T27984] name failslab, interval 1, probability 0, space 0, times 0 16:55:44 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x1bf8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r3, 0x160}, 0x6, 0x9, 0x5}) 16:55:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBLED(r3, 0x4b65, 0x1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="736563757269747900000000000000005c99efd430e2ce101592700000000000000004a7ed769a2e109791807235dae5b0a1e24f61f64b5e714cb0f3d2fd9de3a1bc81a77dc1eacf9104680d2e8cba1aa6748c4097bb3129ba440cea2b8c"], 0xffffffffffffff47) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x6, 0x80000000, 0xff, 0x82b, 0x3}, 0x14) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) ioctl$IOC_PR_RELEASE(r5, 0x401070ca, &(0x7f0000000080)={0x5, 0x957e}) [ 732.524786][T27984] CPU: 1 PID: 27984 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 732.533211][T27984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.543262][T27984] Call Trace: [ 732.546579][T27984] dump_stack+0x11d/0x181 [ 732.550938][T27984] should_fail.cold+0xa/0x1a [ 732.555548][T27984] __should_failslab+0xee/0x130 [ 732.560431][T27984] should_failslab+0x9/0x14 [ 732.564971][T27984] __kmalloc+0x53/0x690 [ 732.569136][T27984] ? __read_once_size.constprop.0+0x12/0x20 [ 732.575066][T27984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.581323][T27984] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 732.587052][T27984] tomoyo_realpath_from_path+0x83/0x4c0 [ 732.592602][T27984] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 732.597997][T27984] tomoyo_path_perm+0x15d/0x390 [ 732.602977][T27984] tomoyo_path_truncate+0x26/0x40 [ 732.608007][T27984] security_path_truncate+0x9b/0xd0 [ 732.613225][T27984] do_sys_ftruncate+0x27d/0x340 [ 732.618088][T27984] __x64_sys_ftruncate+0x3f/0x50 16:55:45 executing program 4: syz_read_part_table(0xa00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:45 executing program 2: syz_read_part_table(0x500, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:45 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x2190, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 732.623027][T27984] do_syscall_64+0xcc/0x370 [ 732.627566][T27984] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 732.633566][T27984] RIP: 0033:0x45a647 [ 732.637467][T27984] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.657086][T27984] RSP: 002b:00007f405ce2d9f8 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 732.665620][T27984] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a647 16:55:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7fff) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 732.673606][T27984] RDX: 0000000020018110 RSI: 0000000000000380 RDI: 0000000000000004 [ 732.681572][T27984] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 732.689545][T27984] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 732.697518][T27984] R13: 0000000000000004 R14: 00000000004e2d88 R15: 0000000000000003 [ 732.707493][T27984] ERROR: Out of memory at tomoyo_realpath_from_path. 16:55:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:45 executing program 5 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:45 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x2728, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x56d, 0x800000) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000400)=""/200) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000300)="9bc97f7e5d487b048fafd4d78c813fe6157ff1ff8119942519dee6e430cc176b71210977a5438cc7e0560b9b489988c959effe183bdd56792728031c6e6b2e7d10aae605ff1c80bc0711ef56d34016a1b5f3bfe32c43c36f279da85a32e324a259097ac9bb8d288bee7fa7782c4b7a72aa8ded8f010583366cb2f00b7508dd8aab8d42b1ad0b5d06198d993333f8ae2344eb13282816ca6b9c47f5a96b87dad375ffc7ab6187559101241bad36f46845c8d7eaf342dbc73c6296bdc439ee00bd0af8b9914c38d9f98ece1d40bac68bff07a682c57a64ca84898101c0aedcdccd1872", 0xe2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'rose0\x00', {0x2, 0x4e23, @loopback}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000140)={{0x1, 0x0, @identifier="1babb869dfe9affd645beaee6b01ec02"}, 0xd2, [], "254f14b7c2daa086b669eeff224af5a62b8234ec0eae841b364f11de92517124c78de53cd79193e016530a12005b60fc4a0e6bc35bbfcaee2a0cb00debde8a0b515f82753f7c44ca391d82c166af6c8cad51225c8b59d94d7f641997d90a89232b5e5a64f36370267b0941c637d3462530ad5db98a3f31a5fdbf54ffc4284a125639c63387744112a02cd481af817d1872c4f7ac5adf1bda704b2c21eb94f5fce843deae619397032e5a580d8237491f3c84741b1319f30310617947b36d5ffd7175002832c127a8be344a1027ec4a2640ba"}) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000000)=""/38, 0x26}], 0x21e) [ 733.305082][T28029] FAULT_INJECTION: forcing a failure. [ 733.305082][T28029] name failslab, interval 1, probability 0, space 0, times 0 [ 733.375372][T28012] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 733.380717][T28012] loop4: partition table partially beyond EOD, truncated [ 733.404847][T28029] CPU: 1 PID: 28029 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 733.413205][T28029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.423260][T28029] Call Trace: [ 733.426563][T28029] dump_stack+0x11d/0x181 [ 733.430902][T28029] should_fail.cold+0xa/0x1a [ 733.435538][T28029] __should_failslab+0xee/0x130 [ 733.440482][T28029] should_failslab+0x9/0x14 [ 733.444987][T28029] __kmalloc+0x53/0x690 [ 733.449153][T28029] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 733.455410][T28029] ? memcg_kmem_put_cache+0x91/0xe0 [ 733.460621][T28029] ? tomoyo_encode2.part.0+0xd9/0x260 [ 733.466032][T28029] tomoyo_encode2.part.0+0xd9/0x260 [ 733.471236][T28029] ? dynamic_dname+0x150/0x150 [ 733.476021][T28029] tomoyo_encode+0x34/0x50 [ 733.480445][T28029] tomoyo_realpath_from_path+0x14a/0x4c0 [ 733.486085][T28029] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 733.491460][T28029] tomoyo_path_perm+0x15d/0x390 [ 733.496436][T28029] tomoyo_path_truncate+0x26/0x40 [ 733.501526][T28029] security_path_truncate+0x9b/0xd0 [ 733.506727][T28029] do_sys_ftruncate+0x27d/0x340 [ 733.511668][T28029] __x64_sys_ftruncate+0x3f/0x50 [ 733.516677][T28029] do_syscall_64+0xcc/0x370 [ 733.521233][T28029] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 733.527122][T28029] RIP: 0033:0x45a647 [ 733.531022][T28029] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 733.550724][T28029] RSP: 002b:00007f405ce2d9f8 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 733.559141][T28029] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 000000000045a647 [ 733.567111][T28029] RDX: 0000000020018110 RSI: 0000000000000380 RDI: 0000000000000004 16:55:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000080), 0x100000000000013f) 16:55:45 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x2cc0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 733.575082][T28029] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 733.583059][T28029] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 733.591060][T28029] R13: 0000000000000004 R14: 00000000004e2d88 R15: 0000000000000003 [ 733.596420][T28012] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 733.599708][T28029] ERROR: Out of memory at tomoyo_realpath_from_path. [ 733.696077][T28012] loop4: p4 size 32768 extends beyond EOD, truncated [ 733.711648][T28012] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 733.714968][T28021] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 733.732396][T28021] loop2: partition table partially beyond EOD, truncated [ 733.753212][T28012] loop4: p6 size 32768 extends beyond EOD, truncated [ 733.764868][T28021] loop2: p1 size 2 extends beyond EOD, truncated [ 733.781202][T28021] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:55:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000000c0)) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x1a620b130d632435, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xb, 0x40000) dup2(r2, r2) shutdown(r2, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 733.854726][T28021] loop2: p4 size 32768 extends beyond EOD, truncated 16:55:46 executing program 4: syz_read_part_table(0xf3d, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 733.913351][T28021] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 733.933484][T28021] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:46 executing program 2: syz_read_part_table(0x600, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:46 executing program 5 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:46 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x3258, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) fstatfs(r2, &(0x7f0000000140)=""/184) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat(r2, &(0x7f0000000000)='./file0\x00', 0x40200, 0x10) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f0000000080)={0x0, 0x7, 0x2005}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) truncate(&(0x7f00000000c0)='./file0/file0\x00', 0x401) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) [ 734.190839][T28070] FAULT_INJECTION: forcing a failure. [ 734.190839][T28070] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 734.254272][T28070] CPU: 0 PID: 28070 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 734.262726][T28070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.272813][T28070] Call Trace: [ 734.276133][T28070] dump_stack+0x11d/0x181 [ 734.280517][T28070] should_fail.cold+0xa/0x1a [ 734.285113][T28070] should_fail_alloc_page+0x50/0x60 [ 734.290355][T28070] __alloc_pages_nodemask+0xd2/0x310 [ 734.295706][T28070] alloc_pages_vma+0xc1/0x3a0 [ 734.300515][T28070] shmem_alloc_page+0x67/0xf0 [ 734.305212][T28070] shmem_alloc_and_acct_page+0x125/0x450 [ 734.310858][T28070] shmem_getpage_gfp+0x2f2/0x1390 [ 734.315923][T28070] ? shmem_xattr_handler_set+0x70/0x70 [ 734.321397][T28070] shmem_write_begin+0x9f/0x140 [ 734.326267][T28070] generic_perform_write+0x136/0x320 [ 734.331549][T28070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.337863][T28070] __generic_file_write_iter+0x251/0x380 [ 734.343633][T28070] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 734.350147][T28070] generic_file_write_iter+0x28c/0x390 [ 734.355620][T28070] new_sync_write+0x388/0x4a0 [ 734.360299][T28070] __vfs_write+0xb1/0xc0 [ 734.364756][T28070] vfs_write+0x18a/0x390 [ 734.369232][T28070] ksys_pwrite64+0xee/0x120 [ 734.373856][T28070] __x64_sys_pwrite64+0x5e/0x80 [ 734.378740][T28070] do_syscall_64+0xcc/0x370 [ 734.383242][T28070] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 734.389131][T28070] RIP: 0033:0x414477 [ 734.393027][T28070] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 734.412620][T28070] RSP: 002b:00007f405ce2d9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 734.421033][T28070] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000414477 [ 734.429003][T28070] RDX: 0000000000000040 RSI: 0000000020000000 RDI: 0000000000000004 [ 734.436983][T28070] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 734.444967][T28070] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000004 [ 734.452927][T28070] R13: 0000000000000004 R14: 00007f405ce2e6d4 R15: 0000000000000003 16:55:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r1, 0x160}, 0x6, 0x9, 0x5}) 16:55:46 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x37f0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000140)={0x27, 0x0, 0x0, 0x4, 0x7, 0x0, "cc0448d4e1965cd1e87830efdcddc991e38fb2015ad172be9a4b389323a290addb7004bc7caba5bdf11834b98f243136fb3fbf3191852043c2bd72bbc21fbd", 0x14}, 0x60, &(0x7f00000006c0)=[{&(0x7f00000001c0)="5f522597bad348c2a0f8dd3ae7a963c2b308fcf892d5174f95a47975696bdcb9f41148a40c8660ff2e101ead6d93cbcbd84599519643d174ab60e209ac7f94a5bf09e6d164685290eaa0674d430fb7588c8141cbce2beabb04a9b1194629d30792700a33ed9a368df175c73c143e75ae66d89c2a8dc357312c010c1a14c9469ad7ee504c9e05308159", 0x89}, {&(0x7f0000000300)="141a4acd57d4c8652e2b9c671e675db244aa624405e4f09eaf58afc6dc5da8eaed320374a80b360bd84d82e058b1bca2a117abe03ac27e7c5d5906418b41e01e147804ae09be1a2edd89af3b48c8b7555b5113a5", 0x54}, {&(0x7f0000000380)="c1cf7cc86067a6e11cef0f9168e4152f67ef24754eacebd4825791b2e774bc50b5f84c3b8666690940eea2527e60496bb01bac9833fb1147f505451c4f85d6b3c5a794d79422fc8984853546a3879f1c895fb544fa6994dbc8489c895e17224e6a770aea4808cd1ea093a8be82f5", 0x6e}, {&(0x7f0000000400)="5743f7617fda3e2f71423799da0b7cb9880450b675a83a88580fd539384f9cedc9c1849075f3cfacb7b5174856cab08429", 0x31}, {&(0x7f0000000440)="33d79880e5eb45b252a313f148dab91b15321361117e9ef5ae0a04b3adab29ef24aacd04048d96a8fdeb3e431b7e12eafcac06", 0x33}, {&(0x7f0000000480)="bb4a0eb72d138de848018affa637d28603a589151b7de50784920f0b4eb4864e29cf3e3ab15ccb481b539abf134c23ac3cd40693e44c4a315835e556e6438f0987bca28a2cc2c8f7749d8c2f96ac7e55b45525be2504e3c451835a48006511d71a836e3d263542fe3c4b3556e2bab3a09054e3a97843738205db519ea82f42764d7a5d17c34ec05af4032cfb1afb0b0a5afc1ad9420c04ce5556b7e79c2ba421321dd51a4c67049f0597595c1426d9d404eba2d6040e8e9f54e55bef1ea4f335c9ca4a81f3a8", 0xc6}, {&(0x7f0000000580)="b3a093a13d3f8380f08ef01b46c7fb93a29415e145ff7a9004bc3974785a9a6aa3bb7c7f5670c9d72b76efd6d2df97672e99d5c3142dd7952918081e2cdd510b035fc3e91b10b3742223abe1bad6e5197403961aba011921da93da62ba831588ddd6d76062ced01c81a4069fdf8767af39baf77257f686f042b9f63193a4faf834928d40d476927e30c7d89505104bd7cc4e48d238c42a35ef17a33a825de906dcc53a6614dd16862442886b03bef1398513ecac3d0cc746f3c5516a48bf3be2", 0xc0}, {&(0x7f0000000640)="bb973ed4df32908c7fb37336a9a1ee017e728dbef1ceb96a8f3b594055bcbfc1288bcdf6a0926740cb67149dd201a8a1521a", 0x32}, {&(0x7f0000000680)="8ac2559caba3653476e2e574a3d93ad85069670a535eb8242a487b5ce9dac9e29713dd5b", 0x24}], 0x9, &(0x7f0000000780)={0x110, 0x104, 0x3, "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"}, 0x110, 0x4040086}, 0x40000) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002040)='/dev/cachefiles\x00', 0x40000, 0x0) getsockname$tipc(r1, &(0x7f0000002080), &(0x7f00000020c0)=0x10) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r4, 0x5441, 0x6) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5fa, 0x101000) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0xc}, 0x9, 0x0, 0xff, 0x8, 0x4, 0x1}, &(0x7f00000000c0)=0x20) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r6, 0x8912, &(0x7f00000017c0)=@req={0x28, &(0x7f0000001780)={'rose0\x00', @ifru_map={0x2, 0x8f, 0x4, 0x1, 0x6, 0x4}}}) [ 734.646110][T28071] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 734.682340][T28071] loop4: partition table partially beyond EOD, truncated [ 734.749051][T28071] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 734.777340][T28079] loop2: p1 < > p2 p3 < p5 p6 > p4 16:55:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r1, 0x160}, 0x6, 0x9, 0x5}) 16:55:47 executing program 5 (fault-call:3 fault-nth:8): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 734.797573][T28071] loop4: p4 size 32768 extends beyond EOD, truncated [ 734.810518][T28079] loop2: partition table partially beyond EOD, truncated [ 734.822528][T28071] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 734.838923][T28079] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 734.855768][T28079] loop2: p4 size 32768 extends beyond EOD, truncated [ 734.871706][T28071] loop4: p6 size 32768 extends beyond EOD, truncated [ 734.894238][T28079] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:55:47 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x3d88, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 734.985449][T28079] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:47 executing program 4: syz_read_part_table(0x1f00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 735.309133][T28106] FAULT_INJECTION: forcing a failure. [ 735.309133][T28106] name failslab, interval 1, probability 0, space 0, times 0 [ 735.336186][T28106] CPU: 1 PID: 28106 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 735.344544][T28106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.354607][T28106] Call Trace: 16:55:47 executing program 2: syz_read_part_table(0x700, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000180)=0x6eaaef29) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r11, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r10, 0x84, 0x13, &(0x7f00000000c0)={r11, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000300)={r9, 0x7, 0x9, 0x1, 0x2, 0x0, 0xfc00, 0x800, {r11, @in6={{0xa, 0x4e22, 0x4, @remote, 0x3f}}, 0x3ff, 0x5, 0xffffffff, 0x10001, 0x6}}, &(0x7f0000000240)=0xb0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) r12 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180), 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r2, r3, r12, 0x3499e24abb03a146) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x51000108}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r13, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 16:55:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r1, 0x160}, 0x6, 0x9, 0x5}) [ 735.357899][T28106] dump_stack+0x11d/0x181 [ 735.362254][T28106] should_fail.cold+0xa/0x1a [ 735.366854][T28106] __should_failslab+0xee/0x130 [ 735.371776][T28106] should_failslab+0x9/0x14 [ 735.376399][T28106] kmem_cache_alloc+0x29/0x5d0 [ 735.381172][T28106] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 735.387095][T28106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.393343][T28106] getname_flags+0x91/0x380 [ 735.397911][T28106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.404161][T28106] getname+0x23/0x40 [ 735.408068][T28106] do_sys_open+0x27f/0x4f0 [ 735.412539][T28106] __x64_sys_open+0x55/0x70 [ 735.417047][T28106] do_syscall_64+0xcc/0x370 [ 735.421558][T28106] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 735.428144][T28106] RIP: 0033:0x414411 [ 735.432141][T28106] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 16:55:47 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x4320, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 735.451755][T28106] RSP: 002b:00007f405ce2d9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 735.451774][T28106] RAX: ffffffffffffffda RBX: 00007f405ce2e6d4 RCX: 0000000000414411 [ 735.451786][T28106] RDX: 00007f405ce2dbaa RSI: 0000000000000002 RDI: 00007f405ce2dba0 16:55:47 executing program 5 (fault-call:3 fault-nth:9): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 735.451797][T28106] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 735.451807][T28106] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 16:55:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) [ 735.451843][T28106] R13: 0000000000000004 R14: 00007f405ce2e6d4 R15: 0000000000000003 16:55:48 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x48b8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) [ 736.032042][T28135] loop4: p1 < > p2 p3 < p5 p6 > p4 16:55:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x4, 0x2, 0x6, 0x5, 0x0, 0x0, 0x10}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r3, &(0x7f0000000580)=@sco, &(0x7f0000000600)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000640)='veno\x00', 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, &(0x7f0000000540)={0xc792cd5db9bfa704, @dev={0xac, 0x14, 0x14, 0x20}, 0x4e20, 0x4, 'wrr\x00', 0x9, 0x4, 0x4a}, 0x2c) r7 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendto$isdn(r9, &(0x7f0000000700)={0x100, 0x1, "441889cba81f322dc3b22dd50d6b9acea6fa52b15ec46215ff574f1231c8f00f4ea9bfecd228213c"}, 0x30, 0x800, &(0x7f0000000740)={0x22, 0x5, 0x40, 0x1, 0x3f}, 0x6) r10 = socket$alg(0x26, 0x5, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000680)={0x4, 0x0, [{0x29a, 0x0, 0x1}, {0xa29, 0x0, 0x6}, {0x845, 0x0, 0x3}, {0x9f9, 0x0, 0x1}]}) sendmsg$IPVS_CMD_SET_CONFIG(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x88, r11, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1f}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xff8}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) sendmsg$IPVS_CMD_GET_INFO(r7, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)={0xf0, r11, 0x130, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4bc}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffa}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x81}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3f}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x40080}, 0x100) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) ioctl$TCSBRKP(r4, 0x5425, 0x2cd4) r12 = accept4(r0, 0x0, 0x0, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = dup2(r13, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) write$apparmor_current(r14, &(0x7f0000000140)=@hat={'permhat ', 0x1, 0x5e, ['\x12em0\'ppp1!@feth0\x03mime_type\x00', 'md5sum\'bdevppp0selfppp1procppp1@.security.vmnet0#keyringvmnet0user\xd7wlan1{\x00', 'md5sumppp0\x00']}, 0x8b) readv(r12, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0xfffffe16}], 0x1) [ 736.087437][T28135] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 736.112162][T28141] FAULT_INJECTION: forcing a failure. [ 736.112162][T28141] name failslab, interval 1, probability 0, space 0, times 0 [ 736.167990][T28135] loop4: p4 size 32768 extends beyond EOD, truncated [ 736.184911][T28131] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 736.194819][T28141] CPU: 1 PID: 28141 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 736.203235][T28141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.203428][T28131] loop2: partition table partially beyond EOD, truncated [ 736.213285][T28141] Call Trace: [ 736.213312][T28141] dump_stack+0x11d/0x181 [ 736.213331][T28141] should_fail.cold+0xa/0x1a [ 736.213353][T28141] __should_failslab+0xee/0x130 [ 736.213424][T28141] should_failslab+0x9/0x14 [ 736.237246][T28135] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 736.237515][T28141] kmem_cache_alloc+0x29/0x5d0 [ 736.253882][T28141] ? perf_swevent_put_recursion_context+0x64/0x70 [ 736.255912][T28135] loop4: p6 size 32768 extends beyond EOD, truncated [ 736.260408][T28141] ? perf_tp_event+0x39f/0x410 [ 736.260454][T28141] __alloc_file+0x4d/0x210 [ 736.276405][T28141] alloc_empty_file+0x8f/0x180 [ 736.281177][T28141] path_openat+0x74/0x36e0 [ 736.285624][T28141] ? __rcu_read_unlock+0x66/0x3c0 [ 736.290655][T28141] ? aa_file_perm+0x1f1/0x8a0 [ 736.295325][T28141] ? __const_udelay+0x36/0x40 [ 736.299996][T28141] ? __udelay+0x10/0x20 [ 736.304143][T28141] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 736.310024][T28141] ? __read_once_size+0x41/0xe0 [ 736.314866][T28141] do_filp_open+0x11e/0x1b0 [ 736.319358][T28141] ? __check_object_size+0x5f/0x346 [ 736.324554][T28141] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 736.330518][T28141] ? __alloc_fd+0x2ef/0x3b0 [ 736.335020][T28141] do_sys_open+0x3b3/0x4f0 [ 736.339462][T28141] __x64_sys_open+0x55/0x70 [ 736.343956][T28141] do_syscall_64+0xcc/0x370 [ 736.348483][T28141] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 736.354359][T28141] RIP: 0033:0x414411 [ 736.358255][T28141] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 736.377876][T28141] RSP: 002b:00007f405ce2d9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 736.386285][T28141] RAX: ffffffffffffffda RBX: 00007f405ce2e6d4 RCX: 0000000000414411 [ 736.394241][T28141] RDX: 00007f405ce2dbaa RSI: 0000000000000002 RDI: 00007f405ce2dba0 [ 736.402256][T28141] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 736.410252][T28141] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 736.418209][T28141] R13: 0000000000000004 R14: 00007f405ce2e6d4 R15: 0000000000000003 [ 736.432357][T28131] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:55:48 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x4e50, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 736.504129][T28131] loop2: p4 size 32768 extends beyond EOD, truncated 16:55:48 executing program 5 (fault-call:3 fault-nth:10): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 736.624301][T28131] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 736.636847][T28164] IPVS: set_ctl: invalid protocol: 42756 172.20.20.32:20000 16:55:49 executing program 4: syz_read_part_table(0x2000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 736.721034][T28131] loop2: p6 size 32768 extends beyond EOD, truncated [ 736.882738][T28180] FAULT_INJECTION: forcing a failure. [ 736.882738][T28180] name failslab, interval 1, probability 0, space 0, times 0 [ 736.904461][T28180] CPU: 0 PID: 28180 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 736.912813][T28180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.922878][T28180] Call Trace: [ 736.926189][T28180] dump_stack+0x11d/0x181 [ 736.930526][T28180] should_fail.cold+0xa/0x1a [ 736.935172][T28180] __should_failslab+0xee/0x130 [ 736.940082][T28180] should_failslab+0x9/0x14 [ 736.944593][T28180] kmem_cache_alloc+0x29/0x5d0 [ 736.950068][T28180] ? kmem_cache_alloc+0x1f3/0x5d0 [ 736.955140][T28180] ? perf_swevent_put_recursion_context+0x64/0x70 [ 736.961556][T28180] security_file_alloc+0x48/0x110 [ 736.966600][T28180] __alloc_file+0xa3/0x210 [ 736.971025][T28180] alloc_empty_file+0x8f/0x180 [ 736.975794][T28180] path_openat+0x74/0x36e0 [ 736.980203][T28180] ? __rcu_read_unlock+0x66/0x3c0 [ 736.985387][T28180] ? aa_file_perm+0x1f1/0x8a0 [ 736.990058][T28180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.996292][T28180] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 737.002194][T28180] ? __read_once_size+0x41/0xe0 [ 737.007039][T28180] do_filp_open+0x11e/0x1b0 [ 737.011539][T28180] ? __check_object_size+0x5f/0x346 [ 737.016772][T28180] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 737.022657][T28180] ? __alloc_fd+0x2ef/0x3b0 [ 737.027234][T28180] do_sys_open+0x3b3/0x4f0 [ 737.031722][T28180] __x64_sys_open+0x55/0x70 [ 737.036230][T28180] do_syscall_64+0xcc/0x370 [ 737.040735][T28180] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 737.046613][T28180] RIP: 0033:0x414411 [ 737.050528][T28180] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 737.070166][T28180] RSP: 002b:00007f405ce2d9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 16:55:49 executing program 2: syz_read_part_table(0x900, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBLED(r3, 0x4b65, 0x1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="736563757269747900000000000000005c99efd430e2ce101592700000000000000004a7ed769a2e109791807235dae5b0a1e24f61f64b5e714cb0f3d2fd9de3a1bc81a77dc1eacf9104680d2e8cba1aa6748c4097bb3129ba440cea2b8c"], 0xffffffffffffff47) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x6, 0x80000000, 0xff, 0x82b, 0x3}, 0x14) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) ioctl$IOC_PR_RELEASE(r5, 0x401070ca, &(0x7f0000000080)={0x5, 0x957e}) 16:55:49 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x53e8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 737.078570][T28180] RAX: ffffffffffffffda RBX: 00007f405ce2e6d4 RCX: 0000000000414411 [ 737.086521][T28180] RDX: 00007f405ce2dbaa RSI: 0000000000000002 RDI: 00007f405ce2dba0 [ 737.094483][T28180] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 737.102472][T28180] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 737.110452][T28180] R13: 0000000000000004 R14: 00007f405ce2e6d4 R15: 0000000000000003 16:55:49 executing program 5 (fault-call:3 fault-nth:11): socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:49 executing program 1: syz_read_part_table(0x700, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 737.285388][T28182] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 737.293256][T28182] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 737.325279][T28182] loop4: p4 size 32768 extends beyond EOD, truncated 16:55:49 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) [ 737.362593][T28182] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:55:49 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x5980, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 737.410215][T28182] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:50 executing program 4: syz_read_part_table(0x2300, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 737.805268][T28196] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 737.830393][T28196] loop2: partition table partially beyond EOD, truncated [ 737.847144][T28204] FAULT_INJECTION: forcing a failure. [ 737.847144][T28204] name failslab, interval 1, probability 0, space 0, times 0 [ 737.905559][T28196] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 737.935444][T28196] loop2: p4 size 32768 extends beyond EOD, truncated [ 737.948874][T28204] CPU: 0 PID: 28204 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 737.957220][T28204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.967281][T28204] Call Trace: [ 737.970659][T28204] dump_stack+0x11d/0x181 [ 737.975003][T28204] should_fail.cold+0xa/0x1a [ 737.979614][T28204] __should_failslab+0xee/0x130 [ 737.984559][T28204] should_failslab+0x9/0x14 [ 737.989093][T28204] __kmalloc+0x53/0x690 [ 737.993255][T28204] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 737.998979][T28204] ? xas_create+0x3a7/0x920 [ 738.003558][T28204] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 738.009372][T28204] tomoyo_realpath_from_path+0x83/0x4c0 [ 738.014922][T28204] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 738.020316][T28204] tomoyo_check_open_permission+0x201/0x320 [ 738.026243][T28204] tomoyo_file_open+0x75/0x90 [ 738.031041][T28204] security_file_open+0x69/0x210 [ 738.036002][T28204] do_dentry_open+0x211/0x970 [ 738.040728][T28204] ? security_inode_permission+0xa5/0xc0 [ 738.046395][T28204] vfs_open+0x62/0x80 [ 738.050454][T28204] path_openat+0xf73/0x36e0 [ 738.055028][T28204] ? __rcu_read_unlock+0x66/0x3c0 [ 738.060069][T28204] ? __read_once_size+0x41/0xe0 [ 738.065192][T28204] do_filp_open+0x11e/0x1b0 [ 738.069765][T28204] ? __alloc_fd+0x2ef/0x3b0 [ 738.074309][T28204] do_sys_open+0x3b3/0x4f0 [ 738.078768][T28204] __x64_sys_open+0x55/0x70 [ 738.083277][T28204] do_syscall_64+0xcc/0x370 [ 738.087869][T28204] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 738.093757][T28204] RIP: 0033:0x414411 [ 738.097700][T28204] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 738.117439][T28204] RSP: 002b:00007f405ce2d9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 738.125852][T28204] RAX: ffffffffffffffda RBX: 00007f405ce2e6d4 RCX: 0000000000414411 [ 738.133967][T28204] RDX: 00007f405ce2dbaa RSI: 0000000000000002 RDI: 00007f405ce2dba0 [ 738.142032][T28204] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a 16:55:50 executing program 1: syz_read_part_table(0x900, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:50 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x5f18, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:50 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) [ 738.150008][T28204] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 738.158822][T28204] R13: 0000000000000004 R14: 00007f405ce2e6d4 R15: 0000000000000003 [ 738.169596][T28196] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 738.183691][T28204] ERROR: Out of memory at tomoyo_realpath_from_path. [ 738.223372][T28196] loop2: p6 size 32768 extends beyond EOD, truncated [ 738.255415][T28229] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 738.270495][T28229] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 738.334866][T28229] loop4: p4 size 32768 extends beyond EOD, truncated [ 738.365715][T28229] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 738.394118][T28229] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:50 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x64b0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:50 executing program 2: syz_read_part_table(0xa00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x2, 0x36c, [0x0, 0x20000300, 0x20000330, 0x2000049e], 0x0, &(0x7f0000000140), &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x0, 0x1, 0xe50, 'hwsim0\x00', 'vxcan1\x00', 'ip_vti0\x00', 'veth1_to_bridge\x00', @random="f065136db1e0", [0x0, 0x1fe, 0x154ede172420629f, 0x0, 0xff], @dev={[], 0x14}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0xae, 0x10e, 0x13e, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x3, 0x0, 0x2}}}], [@common=@STANDARD={'\x00', 0x8, {0x7ffffffffffffffc}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xffc0}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{0x11, 0xa, 0x18, 'hsr0\x00', 'vcan0\x00', 'veth1_to_team\x00', 'irlan0\x00', @broadcast, [0x7f, 0xff, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff], 0x106, 0x136, 0x16e, [@physdev={'physdev\x00', 0x70, {{'gretap0\x00', {}, 'gretap0\x00', {}, 0x7, 0x10}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x401}}}], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffd}}}}]}]}, 0x3e4) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}], 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000680)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r7, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x3c, r8, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01009b00", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r9, @in6={{0xa, 0x4e1d, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r11, 0x40305828, &(0x7f0000000780)={0x0, 0x3, 0xffffffffffffff01}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f00000000c0)={r9, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000080)={r9}, &(0x7f00000000c0)=0x8) 16:55:51 executing program 4: syz_read_part_table(0x3d0f, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:51 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x5a0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:51 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x6a48, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x2, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 739.236937][T28260] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 739.317782][T28260] loop2: partition table partially beyond EOD, truncated [ 739.382389][T28260] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:55:51 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x6fe0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) [ 739.452945][T28260] loop2: p4 size 32768 extends beyond EOD, truncated [ 739.477155][T28260] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:55:51 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 739.501014][T28260] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:52 executing program 2: syz_read_part_table(0x2000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:52 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x7578, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 739.765811][T28307] FAULT_INJECTION: forcing a failure. [ 739.765811][T28307] name failslab, interval 1, probability 0, space 0, times 0 [ 739.795241][T28284] loop4: p1 < > p2 p3 < p5 p6 > p4 16:55:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x3, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 739.818193][T28284] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 739.834003][T28284] loop4: p4 size 32768 extends beyond EOD, truncated [ 739.846987][T28307] CPU: 1 PID: 28307 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 739.855370][T28307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.865420][T28307] Call Trace: [ 739.868728][T28307] dump_stack+0x11d/0x181 [ 739.873061][T28307] should_fail.cold+0xa/0x1a [ 739.877717][T28307] __should_failslab+0xee/0x130 [ 739.882574][T28307] should_failslab+0x9/0x14 [ 739.887077][T28307] __kmalloc+0x53/0x690 [ 739.891291][T28307] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 739.897569][T28307] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 739.903466][T28307] ? sock_kmalloc+0xbf/0x110 [ 739.908127][T28307] sock_kmalloc+0xbf/0x110 [ 739.912605][T28307] hash_alloc_result.part.0+0x5a/0xb0 [ 739.917980][T28307] hash_recvmsg+0x367/0x540 [ 739.922551][T28307] ? apparmor_socket_recvmsg+0x3b/0x50 [ 739.928019][T28307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.934366][T28307] ? hash_alloc_result.part.0+0xb0/0xb0 [ 739.939922][T28307] sock_recvmsg+0x92/0xb0 [ 739.944280][T28307] sock_read_iter+0x15f/0x1e0 [ 739.948966][T28307] do_iter_readv_writev+0x54b/0x5b0 [ 739.954182][T28307] do_iter_read+0x1fc/0x3d0 [ 739.958692][T28307] ? import_iovec+0x17a/0x220 [ 739.963454][T28307] vfs_readv+0x9c/0xf0 [ 739.967613][T28307] ? __fget_light+0xaf/0x190 [ 739.972215][T28307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.978510][T28307] do_readv+0xe3/0x250 [ 739.982586][T28307] __x64_sys_readv+0x4e/0x60 [ 739.987194][T28307] do_syscall_64+0xcc/0x370 [ 739.991715][T28307] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 739.997633][T28307] RIP: 0033:0x45a679 [ 740.001555][T28307] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.021277][T28307] RSP: 002b:00007fafb0853c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 740.024484][T28284] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 740.029781][T28307] RAX: ffffffffffffffda RBX: 00007fafb0853c90 RCX: 000000000045a679 [ 740.029792][T28307] RDX: 0000000000000001 RSI: 0000000020000100 RDI: 0000000000000004 [ 740.029806][T28307] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 740.029827][T28307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fafb08546d4 [ 740.055924][T28284] loop4: p6 size 32768 extends beyond EOD, truncated [ 740.060929][T28307] R13: 00000000004c8105 R14: 00000000004decd8 R15: 0000000000000005 [ 740.099382][T28315] print_req_error: 23 callbacks suppressed [ 740.099402][T28315] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 740.136070][T10685] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 740.270530][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.281471][ T2503] buffer_io_error: 20 callbacks suppressed [ 740.281485][ T2503] Buffer I/O error on dev loop2p6, logical block 0, async page read [ 740.295747][ T2503] blk_update_request: I/O error, dev loop2, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.306674][ T2503] Buffer I/O error on dev loop2p6, logical block 1, async page read 16:55:52 executing program 4: syz_read_part_table(0x3f00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:52 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x7b10, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:52 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 740.315034][ T2503] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.325926][ T2503] Buffer I/O error on dev loop2p6, logical block 2, async page read [ 740.334933][ T2503] blk_update_request: I/O error, dev loop2, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.345824][ T2503] Buffer I/O error on dev loop2p6, logical block 3, async page read [ 740.364827][ T2504] blk_update_request: I/O error, dev loop2, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.375808][ T2504] Buffer I/O error on dev loop2p6, logical block 4, async page read [ 740.384087][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.395050][ T2504] Buffer I/O error on dev loop2p6, logical block 0, async page read [ 740.403523][ T2504] blk_update_request: I/O error, dev loop2, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.414465][ T2504] Buffer I/O error on dev loop2p6, logical block 1, async page read [ 740.422942][ T2504] blk_update_request: I/O error, dev loop2, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.433840][ T2504] Buffer I/O error on dev loop2p6, logical block 2, async page read [ 740.442219][ T2504] blk_update_request: I/O error, dev loop2, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 740.453204][ T2504] Buffer I/O error on dev loop2p6, logical block 3, async page read [ 740.461639][ T2504] Buffer I/O error on dev loop2p6, logical block 4, async page read 16:55:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:53 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x4, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 740.744475][T28329] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) 16:55:53 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x80a8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:53 executing program 2: syz_read_part_table(0x2300, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x5000}], 0x1) 16:55:53 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x8640, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 741.125449][T28345] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 741.143971][T28345] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 741.251691][T28345] loop4: p4 size 32768 extends beyond EOD, truncated [ 741.308389][T28345] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 741.333512][T28345] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:54 executing program 4: syz_read_part_table(0x4000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0xfdef}], 0x1) 16:55:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x5, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:54 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x8bd8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 741.717377][T28379] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 741.764986][T28379] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 741.816527][T28379] loop2: p4 size 32768 extends beyond EOD, truncated 16:55:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) [ 741.875014][T28379] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 741.900548][T28379] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:54 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x9170, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x2000005c}], 0x1) 16:55:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r1, 0x160}, 0x6, 0x9, 0x5}) [ 742.226305][T28412] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 742.253400][T28412] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 742.299251][T28412] loop4: p4 size 32768 extends beyond EOD, truncated [ 742.338630][T28412] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:55:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x7ffff000}], 0x1) 16:55:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x6, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:54 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x9708, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:54 executing program 2: syz_read_part_table(0x3f00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 742.385716][T28412] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:55 executing program 4: syz_read_part_table(0x4800, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r1, 0x160}, 0x6, 0x9, 0x5}) 16:55:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0xfffffdef}], 0x1) 16:55:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x7, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:55 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x9ca0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r1, 0x160}, 0x6, 0x9, 0x5}) [ 742.985515][T28444] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 743.029823][T28444] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:55:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0xfffffffffffffdef}], 0x1) [ 743.132672][T28444] loop2: p4 size 32768 extends beyond EOD, truncated [ 743.179730][T28444] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 743.203448][T28444] loop2: p6 size 32768 extends beyond EOD, truncated 16:55:55 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xa238, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x8, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x2) [ 743.405409][T28473] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 743.414224][T28473] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 743.433994][T28473] loop4: p4 size 32768 extends beyond EOD, truncated [ 743.453423][T28473] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 743.476103][T28473] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:56 executing program 2: syz_read_part_table(0x4000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:56 executing program 4: syz_read_part_table(0x4c00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:56 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xa7d0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x8) 16:55:56 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x10, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$nfc_llcp(r2, &(0x7f0000000140), &(0x7f0000000000)=0x60, 0x80000) syz_open_dev$ndb(&(0x7f0000000240)='/dev/nbd#\x00', 0x0, 0x410040) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x4e20, @empty}}) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000200)=""/18) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0xffffff55) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) 16:55:56 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xad68, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 744.383728][T28511] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 744.425529][T28511] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 744.461368][T28511] loop2: p4 size 32768 extends beyond EOD, truncated 16:55:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='\xf2\xd1\x10E\xd0') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0xfff, 0x0) kexec_load(0x401, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="16359e63239d491627de72fbc9af6e4d33d76e85ddf7b9925338f04f05f408572ad48d78fe69fd0a9f63c1de4ec08519701b42c8734f9605697f988af30c1922cf640e33290b8ea07b652952d6c1fd33f2cf7bbba36d6ab3b6ac561c687a8017e0d927e2daf37d0343f1", 0x6a, 0x4, 0x7}], 0xa0000) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000008, 0x1010, r5, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f0000000280)={0x0, 0x0, 0x2080}) [ 744.598131][T28511] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:55:57 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x300, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r2, 0x160}, 0x6, 0x9, 0x5}) [ 744.662812][T28511] loop2: p6 size 32768 extends beyond EOD, truncated [ 744.687532][T28537] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 744.703127][T28537] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 744.753280][T28537] loop4: p4 size 32768 extends beyond EOD, truncated [ 744.768021][T28537] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 744.828040][T28537] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:57 executing program 2: syz_read_part_table(0x4800, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 745.168280][T28570] print_req_error: 166 callbacks suppressed [ 745.168335][T28570] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 745.169329][T28569] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 745.174422][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 745.186843][T28571] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 745.197624][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 745.209109][T28573] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 745.229505][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 745.231501][T28568] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 745.241410][T10685] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 745.266169][T28574] blk_update_request: I/O error, dev loop2, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 745.289933][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 745.300963][ T2503] buffer_io_error: 168 callbacks suppressed [ 745.300974][ T2503] Buffer I/O error on dev loop2p6, logical block 0, async page read [ 745.315028][ T2503] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 745.323253][ T2503] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 745.331377][ T2503] Buffer I/O error on dev loop2p6, logical block 0, async page read [ 745.339434][ T2503] Buffer I/O error on dev loop2p4, logical block 0, async page read [ 745.347539][ T2503] Buffer I/O error on dev loop2p2, logical block 0, async page read [ 745.355691][ T2503] Buffer I/O error on dev loop2p5, logical block 0, async page read 16:55:57 executing program 4: syz_read_part_table(0x6000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:57 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xb300, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:57 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x160}, 0x6, 0x9, 0x5}) 16:55:57 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x380, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 745.363746][ T2503] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 745.374853][ T2503] Buffer I/O error on dev loop2p4, logical block 0, async page read [ 745.382955][ T2503] Buffer I/O error on dev loop2p2, logical block 0, async page read 16:55:58 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xb898, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x208000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000080)={0x3, r3, 0x1}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) alarm(0x3f) 16:55:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x160}, 0x6, 0x9, 0x5}) [ 745.946194][T28595] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 745.976525][T28595] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 746.008783][T28595] loop2: p4 size 32768 extends beyond EOD, truncated [ 746.033553][T28596] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 746.039061][T28595] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 746.047988][T28596] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:55:58 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xbe30, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:58 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x500, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 746.077882][T28596] loop4: p4 size 32768 extends beyond EOD, truncated [ 746.093246][T28595] loop2: p6 size 32768 extends beyond EOD, truncated [ 746.106539][T28596] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:55:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/50, 0x32}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000040)=0x6) [ 746.183207][T28596] loop4: p6 size 32768 extends beyond EOD, truncated 16:55:59 executing program 2: syz_read_part_table(0x4c00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:59 executing program 4: syz_read_part_table(0x6800, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x160}, 0x6, 0x9, 0x5}) 16:55:59 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xc3c8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000000)={0xfff, 0x10000, 0x10000, 0x8, 0x7fffffff, 0xbba3, 0xfd1b}) r3 = accept4(r0, 0x0, 0x0, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000900)=[&(0x7f0000000680)='\x00', &(0x7f00000006c0)='cryptd(sha224-generic)\x00', &(0x7f0000000700)='\\Sem0\'ppp0wlan0\x00', &(0x7f0000000740)='cryptd(sha224-generic)\x00', &(0x7f0000000780)='-\x00', &(0x7f00000007c0)='selfGPL^(ppp0]\x00', &(0x7f0000000800)='ppp1\x00', &(0x7f0000000840)='hash\x00', &(0x7f0000000880)='\xe0keyring\x00', &(0x7f00000008c0)='bdev\x00'], &(0x7f0000000b40)=[&(0x7f0000000980)='!security\x00', &(0x7f00000009c0)='\x00', &(0x7f0000000a00)='*\x00', &(0x7f0000000a40)='hash\x00', &(0x7f0000000a80)='cryptd(sha224-generic)\x00', &(0x7f0000000ac0)='cryptd(sha224-generic)\x00', &(0x7f0000000b00)='\x00']) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) socket$inet_sctp(0x2, 0x2c4fc84f108e2495, 0x84) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) sendmsg$sock(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="368ba41f86c2ff8bb569ce40cf670a8ec9bf249fabd38971ea809868b713e916b2f5bc755160dcadf94bd473753514c0db8b6b9a22877f15b698226de6c405d759a93abf44643cdc3c1f931ed1cab4c0d33ed27718d8b20fc9bba3e44e0d3b8e5c97fd19efdaefd5ebeff3b1ccade33a97a4920e03ccd5f74d336209426ba884926ec4f35f9bdbc8d5b7b77dde0040e4731271021bb8cc5544302ec0eaea339fed38d1626fb8f669439e9d24eabe8aa9ca96648355c5f54995f91ca7244d0a7e2ed4cd", 0xc3}, {&(0x7f0000000300)="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", 0xfe}, {&(0x7f0000000400)="fc3a0829a873dd41970b0a36cb3930f3f388d27884b60f81c6610787cd0ac40c2c07d57c29e6e6c60056b20a03613dc4a6919a8326267a0d663c2993095a29dc68679eaf9ed0723714b7be75dda190553fc8d733e9d85ace2538b8b761b8a083ee022f84640725fe327c0d029137a3af0f553a69da65aa0bccceba5815a12c5a57e25c3a3cbffec32f81dcf63c8d22ce6215641310ad4d6c1f8db5bd598f01aea08cbd39a1e003cb60c80677a24eb3b599e79d3cba2a8ac925992b88725cd5c890d3590997c09703df57219b8aa1f79764db6792652300b32f6c670c1838533d", 0xe0}, {&(0x7f0000000500)="7204998e0b119b31213b7f97bcfef5237a1ec1dde1dc92b3a3a7b833908c1be51e9d8c4b851efad793c40f9a052e309d126c131c61d405d0fd956615f8c8aa40505784f6f3f5d9d30aa386d61a515d359566131a85b33928147abb57a608442fbf6de5b124d8fda1ade8ce507271618445d3ecdaf065e9844ef6db6e8839ce5684fd37df99df83a0a0a2961ca9c9a5de2879e924883953a0b8badee9dc79a1036d", 0xa1}], 0x4, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xd5}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}], 0xa8}, 0x8080) 16:55:59 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x600, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCRSACCEPT(r3, 0x89e3) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:55:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) 16:55:59 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xc960, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:55:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x2) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/37, 0x2c0}], 0x0) 16:55:59 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x700, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:55:59 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xcef8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 747.388676][T28662] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 747.395498][T28662] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 747.413390][T28662] loop2: p4 size 32768 extends beyond EOD, truncated [ 747.471256][T28662] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 747.487632][T28662] loop2: p6 size 32768 extends beyond EOD, truncated [ 747.513776][T28663] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 747.574575][T28663] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 747.618667][T28663] loop4: p4 size 32768 extends beyond EOD, truncated [ 747.654139][T28663] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 747.675353][T28663] loop4: p6 size 32768 extends beyond EOD, truncated 16:56:00 executing program 2: syz_read_part_table(0x6000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:00 executing program 4: syz_read_part_table(0x6c00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) 16:56:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x402c0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in={{0x2, 0x4e22, @rand_addr=0x5}}, 0x4, 0xeb}, &(0x7f0000000080)=0x90) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:00 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xd490, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:00 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x3f00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) 16:56:00 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xda28, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:00 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x8003, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)=0x9) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = syz_open_dev$vcsa(&(0x7f0000002d40)='\x00\x10\x00&\xb9\x00\x00\x17M\xf1\xd5', 0xc03b, 0x80) getsockopt(r1, 0x8, 0x7, &(0x7f0000000140)=""/86, &(0x7f00000001c0)=0x56) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002d80)={'vxcan0\x00', 0x0}) sendmsg$xdp(r3, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x2c, 0x1, r4, 0x18}, 0x10, &(0x7f0000002e80)=[{&(0x7f0000002e00)="bb3f9a96cd3c8660b5208d6958e71f2cec98021109a44537f48237a0e05539039ea8c37057c5efe6f6f873595776c33c4d69c1326c3eebe57af059b85c39b02b01573841dd87d8e84934a1dd47", 0x4d}], 0x1, 0x0, 0x0, 0x40}, 0x8802) r5 = accept4(r0, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_G_FREQUENCY(r7, 0xc02c5638, &(0x7f0000000200)={0x8, 0x5}) r8 = socket(0x11, 0x4, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r8, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000080)=0x4) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 748.496776][T28722] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x160}, 0x6, 0x9, 0x5}) [ 748.565557][T28722] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 748.585640][T28722] loop2: p4 size 32768 extends beyond EOD, truncated 16:56:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x222000, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r4, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9, 0x10001}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={r4, 0x3, 0x1, 0x8001, 0x5a4, 0xff, 0x9, 0x9c0, {0x0, @in6={{0xa, 0x4e24, 0x401, @empty, 0xc5}}, 0x65, 0x1, 0x8000, 0x4, 0x7fffffff}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x9, 0x2}, 0x8) r6 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = accept4(r6, 0x0, 0x0, 0xc00) readv(r7, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 748.616124][T28728] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 748.621606][T28722] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 748.639260][T28722] loop2: p6 size 32768 extends beyond EOD, truncated [ 748.655463][T28728] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 748.679175][T28728] loop4: p4 size 32768 extends beyond EOD, truncated [ 748.750794][T28728] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 748.826261][T28728] loop4: p6 size 32768 extends beyond EOD, truncated 16:56:01 executing program 2: syz_read_part_table(0x6800, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:01 executing program 4: syz_read_part_table(0x7400, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:01 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xdfc0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:01 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xeffd, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{}, 0x6, 0x9, 0x5}) 16:56:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x41) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$vsock_dgram(0x28, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x5, 0x240840) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000400)={0x1c, 0x0, &(0x7f0000000240)=[@release={0x40046306, 0x1}, @acquire_done], 0xd2, 0x0, &(0x7f0000000300)="08fcdadbbabe45809f1afc48fe022f634c6c89ebb1d42d77ee1a1b3db7ca87445de58c5dc2783faf2f1b6746be059dbe424d25d3c68359f5d6e1ab931d38fcc9965c19b053146b8bc99ae78c23aadadaf144ae44e53b6b0da64dc4804f969ae04571d80ca533568a2bf499deeaf85efb2f2a99e328ca4d9b9cbce243d276a3f507f00c9e907a7e8ae47fe728b7b69eacfbbc2b24fa3fbace2cefcd18c7798389fe903db004f8241f8e88ed38da6c50a6617008d36cb21696b79ed79483c5fbceaaba011172b873e42e04834b1e8c97f6e4b1"}) r7 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$ax25_SO_BINDTODEVICE(r7, 0x101, 0x19, &(0x7f0000000000)=@rose={'rose', 0x0}, 0x10) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) recvmmsg(r3, &(0x7f0000009e40)=[{{&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000540)=""/136, 0x88}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/139, 0x8b}, {&(0x7f0000000700)=""/100, 0x64}, {&(0x7f0000000780)=""/238, 0xee}, {&(0x7f0000000880)=""/194, 0xc2}], 0x6, &(0x7f0000000a00)=""/4096, 0x1000}, 0x7f}, {{&(0x7f0000001a00)=@generic, 0x80, &(0x7f0000002d00)=[{&(0x7f0000001a80)=""/104, 0x68}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/29, 0x1d}, {&(0x7f0000002b40)=""/240, 0xf0}, {&(0x7f0000002c40)=""/151, 0x97}], 0x5, &(0x7f0000002d80)=""/162, 0xa2}, 0x5}, {{&(0x7f0000002e40)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000002ec0)=""/63, 0x3f}, {&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000003f00)=""/221, 0xdd}, {&(0x7f0000004000)=""/221, 0xdd}, {&(0x7f0000004100)=""/181, 0xb5}, {&(0x7f00000041c0)=""/8, 0x8}, {&(0x7f0000004200)=""/225, 0xe1}, {&(0x7f0000004300)=""/229, 0xe5}, {&(0x7f0000004400)=""/81, 0x51}, {&(0x7f0000004480)}], 0xa, &(0x7f0000004580)=""/140, 0x8c}, 0x5}, {{&(0x7f0000004640)=@hci, 0x80, &(0x7f0000006b40)=[{&(0x7f00000046c0)=""/222, 0xde}, {&(0x7f00000047c0)=""/216, 0xd8}, {&(0x7f00000048c0)=""/4096, 0x1000}, {&(0x7f00000058c0)=""/96, 0x60}, {&(0x7f0000005940)=""/193, 0xc1}, {&(0x7f0000005a40)=""/181, 0xb5}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/24, 0x18}], 0x8, &(0x7f0000006bc0)=""/43, 0x2b}, 0x100}, {{0x0, 0x0, &(0x7f0000006c80)=[{&(0x7f0000006c00)=""/68, 0x44}], 0x1, &(0x7f0000006cc0)=""/222, 0xde}, 0x3}, {{&(0x7f0000006dc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000007100)=[{&(0x7f0000006e40)=""/156, 0x9c}, {&(0x7f0000006f00)=""/121, 0x79}, {&(0x7f0000006f80)=""/65, 0x41}, {&(0x7f0000007000)=""/128, 0x80}, {&(0x7f0000007080)=""/91, 0x5b}], 0x5, &(0x7f0000007180)=""/236, 0xec}, 0x2a4}, {{&(0x7f0000007280)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000007540)=[{&(0x7f0000007300)=""/175, 0xaf}, {&(0x7f00000073c0)=""/23, 0x17}, {&(0x7f0000007400)=""/3, 0x3}, {&(0x7f0000007440)=""/166, 0xa6}, {&(0x7f0000007500)=""/2, 0x2}], 0x5, &(0x7f00000075c0)=""/15, 0xf}, 0x7ff}, {{&(0x7f0000007600)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000009780)=[{&(0x7f0000007680)=""/62, 0x3e}, {&(0x7f00000076c0)=""/4096, 0x1000}, {&(0x7f00000086c0)=""/4096, 0x1000}, {&(0x7f00000096c0)=""/143, 0x8f}], 0x4, &(0x7f00000097c0)=""/221, 0xdd}, 0x38}, {{&(0x7f00000098c0)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000009ac0)=[{&(0x7f0000009940)=""/102, 0x66}, {&(0x7f00000099c0)=""/242, 0xf2}], 0x2}, 0x2}, {{&(0x7f0000009b00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000009d80)=[{&(0x7f0000009b80)=""/12, 0xc}, {&(0x7f0000009bc0)=""/97, 0x61}, {&(0x7f0000009c40)=""/98, 0x62}, {&(0x7f0000009cc0)=""/99, 0x63}, {&(0x7f0000009d40)=""/50, 0x32}], 0x5, &(0x7f0000009e00)=""/11, 0xb}, 0x4}], 0xa, 0x10006, &(0x7f000000a0c0)={0x77359400}) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = dup2(r11, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f000000a100)={0x2c3617d851ca7cd2, 0x100, 0x22f8, 0x7, 0x80, r9, 0x619, [], r10, r12, 0x5, 0x2}, 0x3c) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000140)={r3, r4, 0xbe02, 0x5b, &(0x7f0000000080)="a655675f2e74899eccdb25e28ae7b8dda5d90ee596ca02922d8ce9568572ca494790f76dc1610b7e52c0bdf31906385687c76c8afb4d77527ab3014d3e097b9f3e36e8af2d41c9a39bf8438b05591c834e220c1f4a5f1df3a3475f", 0x40, 0xff, 0x81, 0xff76, 0xa19, 0x3, 0x0, 'syz1\x00'}) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 749.337444][T28769] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{}, 0x6, 0x9, 0x5}) [ 749.375359][T28769] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:01 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xe558, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 749.468144][T28769] loop2: p4 size 32768 extends beyond EOD, truncated [ 749.491595][T28769] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 749.519132][T28769] loop2: p6 size 32768 extends beyond EOD, truncated 16:56:02 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xfdef, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{}, 0x0, 0x9, 0x5}) [ 749.676415][T28784] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 749.687554][T28784] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x40) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$TCSETS(r6, 0x5402, &(0x7f00000001c0)={0x4, 0x5, 0x0, 0x8, 0xd, 0x2, 0x6, 0x1, 0x7f, 0x7fffffff, 0xcd, 0xf1e4}) dup2(r5, r5) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x4, 0x318, 0x0, 0x180, 0xc0, 0x180, 0x180, 0x280, 0x280, 0x280, 0x280, 0x280, 0x4, &(0x7f0000000180), {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ip={@rand_addr, @local, 0xffffffff, 0xffffffff, 'irlan0\x00', 'dummy0\x00', {}, {}, 0x73, 0x6, 0x1a1753f5f8dc7dae}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x840, 0xb5c71588e34f6c54}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x2498, 0xf9}, {0x6619, 0x3f, 0x1f}, {0x9, 0x4, 0xff}, 0x8001, 0x4}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000000)) ioctl$KIOCSOUND(r2, 0x4b2f, 0x100000001) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r7 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000f80)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"], 0x4d0) readv(r7, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 749.746868][T28784] loop4: p4 size 32768 extends beyond EOD, truncated [ 749.786628][T28784] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:02 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xeaf0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 749.880266][T28769] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 749.884115][T28784] loop4: p6 size 32768 extends beyond EOD, truncated 16:56:02 executing program 2: syz_read_part_table(0x6c00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:02 executing program 4: syz_read_part_table(0x7a00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000005c0)=0x1) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000440)="c9c4a94800270611ce2bafaa57458d2afd73502ea6e7df37bb689bf04ea291b8396c6477f1561f7ed5ce224e7cd836c422e0c2e932871974297299d88d2ae2031774c1c17256d7cfff878c3ead37e965e92cdd015b3677f46a3a082cc60b6adea394e960be1f45645fcf16c24bf0413e0b5e0624459dd03065557f91015a1a069f8f1b866f60c9025b407b1fdfb4f6b0305b547044011229670eb5213f3a0aac91dd080bb462a3c6d17d2f7aef1311a07b1205dfd61d0d7e97097a2185699e99914a69b3e44648fa94c51161c4370deead645115489f2c856733", 0xda}, {&(0x7f0000000540)='e', 0x1}], 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000600)='/dev/midi#\x00', 0x1, 0x840600) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000640)=0x3) readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/40, 0x28}, {&(0x7f0000000040)=""/142, 0x8e}, {&(0x7f0000000100)=""/250, 0xfa}, {&(0x7f0000000200)=""/126, 0x7e}, {&(0x7f0000000300)=""/183, 0xb7}], 0x5) 16:56:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{}, 0x0, 0x9, 0x5}) 16:56:02 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xff00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:02 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xf088, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 750.540808][T28842] print_req_error: 681 callbacks suppressed [ 750.540828][T28842] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 16:56:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x5, 0x8e6, [0x0, 0x20000300, 0x20000330, 0x200007f4], 0x0, &(0x7f0000000000), &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x3, 0x50, 0x6002, 'hsr0\x00', 'caif0\x00', 'gretap0\x00', 'veth1\x00', @remote, [0x101, 0x1fe, 0x0, 0x0, 0x0, 0xff], @local, [0x0, 0x101, 0x80, 0xff, 0x7f, 0x181], 0x2f6, 0x2f6, 0x326, [@helper={'helper\x00', 0x28, {{0x0, 'tftp-20000\x00'}}}, @bpf0={'bpf\x00', 0x210, {{0x7, [{0x81cf, 0x80, 0x4, 0x81}, {0x0, 0x7, 0xf3, 0x1}, {0x6, 0x81, 0x0, 0xfff}, {0x2, 0x7, 0x0, 0x614}, {0xfff, 0x2, 0x1f, 0x1}, {0x9, 0x3, 0x4, 0xff}, {0x7, 0x7f, 0x2, 0x5}, {0x7fff, 0x3, 0x20, 0x8}, {0x401, 0x30, 0x3, 0x4}, {0x0, 0x6c, 0x4, 0xc7a40000}, {0x1, 0x3f, 0x0, 0x3d}, {0xa460, 0x1f, 0x6, 0x1}, {0x8, 0x40, 0x1, 0x9}, {0x7, 0x0, 0x7, 0x62d}, {0x0, 0x9, 0x28, 0xba}, {0x5, 0x0, 0x1, 0x3}, {0x1000, 0x4, 0xe1, 0x74}, {0x20, 0x2, 0x44, 0x8}, {0x0, 0x6, 0x3, 0x101}, {0x9, 0x1, 0x3, 0x6}, {0x1, 0x60, 0x9}, {0xf6c, 0x20, 0x9, 0xfff}, {0xd3b, 0x0, 0x4, 0x1}, {0x5, 0x7f, 0x2, 0x7fff}, {0x0, 0x2b, 0x40, 0x8}, {0x1000, 0xff, 0x6, 0x9}, {0x57, 0xfe, 0x4, 0x52f}, {0x56, 0x80, 0x81, 0xca}, {0xa781, 0xa1, 0x40, 0x1}, {0x3e, 0x6, 0xff, 0xe3}, {0x2, 0x0, 0x0, 0x101}, {0x2, 0x97, 0x8, 0x40}, {0x3, 0x61, 0xfe, 0x1f}, {0xde1, 0x2, 0xff, 0xda21}, {0x0, 0x7f, 0x3, 0x7f}, {0x7, 0x1, 0x6, 0x674d}, {0x2, 0x96, 0x7f, 0x1}, {0x1, 0x3f, 0x64, 0x6}, {0x5fb, 0xf7, 0x8, 0xfff}, {0x1f, 0x7, 0x3f, 0x4}, {0x200, 0x80, 0x50, 0x9}, {0x8, 0xc0, 0x4, 0x4}, {0x6, 0x17, 0x5, 0x1}, {0x755, 0x1, 0x1, 0x4c31}, {0x8, 0x2, 0x18, 0x800}, {0xffe0, 0x6, 0x1f, 0xd0}, {0x4, 0x3, 0x0, 0x6}, {0x6000, 0x2, 0x8, 0xffffff6d}, {0x1, 0x3, 0x4, 0x24}, {0x1, 0x5, 0x7f, 0x3}, {0x2000, 0x5, 0x0, 0x400}, {0x1, 0x5, 0x5f, 0x4}, {0xfff9, 0x2, 0x4, 0x1}, {0x8, 0xe, 0x1, 0x40}, {0x4fcd, 0x0, 0x3, 0xdb8c}, {0x1, 0x5, 0x3, 0x80000001}, {0x1, 0x8, 0x81, 0x1000}, {0x800, 0xaf, 0x40, 0x10000}, {0x2, 0x1f, 0x0, 0xd4}, {0x3f, 0x3f, 0xa1, 0x5}, {0x1, 0xb0, 0x30, 0x1ff}, {0x5, 0x3f, 0x1, 0x4}, {0x1, 0x80, 0xc6, 0x6}, {0x2}], 0xfffffff800000000}}}], [], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x2}}}}, {0x5, 0x13, 0x8914, 'lapb0\x00', 'veth1_to_hsr\x00', 'vlan0\x00', 'bridge_slave_1\x00', @local, [0x1fe, 0x101, 0x0, 0xff], @random="1d71044970e9", [0xff, 0x0, 0x1fe, 0x0, 0xff], 0x9e, 0x11e, 0x16e, [@m802_3={'802_3\x00', 0x8, {{0xf4, 0x4da, 0x2}}}], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0x1f}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xd563}}}], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x401, 'syz1\x00', 0x2}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x11, 0x31, 0x3, 'team_slave_0\x00', 'bcsh0\x00', 'lapb0\x00', 'ip_vti0\x00', @dev={[], 0x17}, [0x0, 0xff, 0x0, 0xff, 0xff], @random="3a05d541f81f", [0xff, 0xff, 0x80, 0xff, 0xff, 0xff], 0x6e, 0xd6, 0x106, [], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}, @common=@dnat={'dnat\x00', 0x10, {{@local, 0x10}}}], @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x3, 0x1, 0x2, [{0x3, 0x41, 0x8914, 'veth0\x00', 'syz_tun\x00', 'nr0\x00', 'bond0\x00', @empty, [0x0, 0x1fe, 0x0, 0xff, 0x0, 0xff], @local, [0xff, 0xe63cae4726ffbbd1, 0x0, 0x0, 0x0, 0xff], 0x6e, 0x11e, 0x14e, [], [@common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0xd}, 0xfffffffffffffffc}}}, @common=@nflog={'nflog\x00', 0x50, {{0x9, 0x3, 0x9, 0x0, 0x0, "44d699acff8324b08a3b9d10b1af527fa6ea5a2c6ffe89af526c1fc91d95b5181faf0268052d024fce8ba88fdfe8e6472932bbf27693426f4ab31d20738d78be"}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}}, {0x5, 0xe5, 0x88f5, 'nlmon0\x00', 'veth1_to_bridge\x00', 'yam0\x00', 'lapb0\x00', @empty, [0x0, 0x7f, 0xff, 0x876d87cef79c84e7, 0x0, 0xff], @dev={[], 0x20}, [0x0, 0x101, 0x0, 0x0, 0x0, 0xff], 0x6e, 0x10e, 0x13e, [], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0xffffffff, 'syz1\x00', 0xc2c4}}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x1f, 0x3}}}], @common=@STANDARD={'\x00', 0x8}}]}]}, 0x95e) [ 750.591552][T28838] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 16:56:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{}, 0x0, 0x0, 0x5}) [ 750.657472][T28844] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 750.671425][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 750.682773][ T2503] buffer_io_error: 664 callbacks suppressed [ 750.682788][ T2503] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 750.699586][ T2503] blk_update_request: I/O error, dev loop2, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 750.710593][ T2503] Buffer I/O error on dev loop2p5, logical block 1, async page read [ 750.719147][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 750.730114][ T2503] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 750.738841][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:56:03 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xf620, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 750.750175][ T2503] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 750.758501][ T2503] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 750.769659][ T2503] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 750.778450][ T2503] blk_update_request: I/O error, dev loop2, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 750.789776][ T2503] Buffer I/O error on dev loop2p5, logical block 1, async page read [ 750.798542][ T2504] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 750.809506][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 750.817734][ T2504] Buffer I/O error on dev loop2p4, logical block 0, async page read [ 750.826137][ T2504] Buffer I/O error on dev loop2p4, logical block 1, async page read [ 750.834609][ T2503] Buffer I/O error on dev loop2p4, logical block 0, async page read [ 750.947744][T28834] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 750.973516][T28834] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 750.995060][T28843] loop4: p1 < > p2 p3 < p5 p6 > p4 16:56:03 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x1000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 751.018365][T28843] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 751.064966][T28834] loop2: p4 size 32768 extends beyond EOD, truncated [ 751.077831][T28843] loop4: p4 size 32768 extends beyond EOD, truncated [ 751.105388][T28834] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 751.125231][T28843] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 751.134139][T28834] loop2: p6 size 32768 extends beyond EOD, truncated 16:56:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, &(0x7f0000000080)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)) [ 751.178556][T28843] loop4: p6 size 32768 extends beyond EOD, truncated 16:56:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = dup3(r1, r0, 0x0) ioctl$KDDISABIO(r2, 0x4b37) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) readahead(r4, 0x5, 0x5) dup2(r3, r3) r5 = accept4(r3, 0x0, 0x0, 0x80000) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, &(0x7f0000000000)) readv(r5, &(0x7f0000000980)=[{&(0x7f00000000c0)=""/105, 0x69}, {&(0x7f0000000680)=""/99, 0x63}, {&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000880)=""/197, 0xbb}, {&(0x7f0000000300)=""/153, 0xf}, {&(0x7f00000003c0)=""/241, 0xf1}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000800)=""/126, 0x7a}], 0x9) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) ioctl$sock_netdev_private(r6, 0x89f8, &(0x7f0000000140)="ea72f46774ef73cfa876287435673e954687353f7d664805cb91d8fe4eaecf98417512c729b972a8090766844f7efd0df3ba0cb91d5bd1338fea7c1342c42f6f5053454ac499d83fb7ba7442edcce7413cb849aeb91d5f2807f8071b8850c028c3caea3454b63ee921e5f6227732a4a301422dcf420f8554292eb84f5515498998f455f28c01314c3c9031") r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) fcntl$setsig(r10, 0xa, 0x19) 16:56:04 executing program 2: syz_read_part_table(0x7400, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:04 executing program 4: syz_read_part_table(0x9000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:04 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x2000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:04 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xfa0f, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100), 0x0) 16:56:04 executing program 0: syz_read_part_table(0x7400, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:04 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xfbb8, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 752.225396][T28900] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 752.234420][T28900] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 752.245712][T28900] loop0: p4 size 32768 extends beyond EOD, truncated [ 752.253097][T28900] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 752.261213][T28900] loop0: p6 size 32768 extends beyond EOD, truncated 16:56:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xbcef, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000080)={0x2}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:04 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x3000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 752.569843][T28908] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 752.606084][T28912] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 752.628423][T28908] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 752.639126][T28912] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 752.668022][T28908] loop2: p4 size 32768 extends beyond EOD, truncated [ 752.687171][T28912] loop4: p4 size 32768 extends beyond EOD, truncated [ 752.708058][T28908] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 752.728503][T28912] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:05 executing program 0: syz_read_part_table(0x6c00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:05 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0x2000ffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 752.747035][T28908] loop2: p6 size 32768 extends beyond EOD, truncated [ 752.778982][T28912] loop4: p6 size 32768 extends beyond EOD, truncated 16:56:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000001900e6008003000000010000000300000007000000feffffff00"/48]) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000000)) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) setsockopt$RXRPC_SECURITY_KEY(r7, 0x110, 0x1, &(0x7f0000000180)='/&*loppp1\x00', 0xa) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) connect$can_bcm(r5, &(0x7f0000000140)={0x1d, r8}, 0x10) 16:56:05 executing program 2: syz_read_part_table(0x7a00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:05 executing program 4: syz_read_part_table(0xff00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:05 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:05 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x4000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000080)=0x4) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 753.735982][T28955] loop0: p1 < > p2 p3 < p5 p6 > p4 16:56:06 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 753.780406][T28955] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 753.844533][T28955] loop0: p4 size 32768 extends beyond EOD, truncated [ 753.858937][T28972] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 753.890575][T28972] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 753.917380][T28972] loop4: p4 size 32768 extends beyond EOD, truncated [ 753.924492][T28955] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 753.957101][T28972] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 753.971351][T28955] loop0: p6 size 32768 extends beyond EOD, truncated [ 754.014033][T28972] loop4: p6 size 32768 extends beyond EOD, truncated [ 754.051426][T28975] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:06 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x5000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 754.062681][T28975] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 754.074367][T28975] loop2: p4 size 32768 extends beyond EOD, truncated 16:56:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) [ 754.121140][T28975] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:06 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 754.167785][T28975] loop2: p6 size 32768 extends beyond EOD, truncated 16:56:06 executing program 0: syz_read_part_table(0x6c00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 754.349836][ T26] audit: type=1326 audit(1575132966.741:51926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28996 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0x0 16:56:06 executing program 4: syz_read_part_table(0xff0f, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:07 executing program 2: syz_read_part_table(0x9000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:07 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:07 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x6000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:07 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 755.011274][T29021] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 755.027276][T29021] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 755.052132][T29021] loop4: p4 size 32768 extends beyond EOD, truncated [ 755.058543][T29019] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 755.072224][T29019] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 755.089674][T29021] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 755.112660][ T26] audit: type=1326 audit(1575132967.501:51927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28996 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0x0 [ 755.114187][T29019] loop0: p4 size 32768 extends beyond EOD, truncated [ 755.138679][T29021] loop4: p6 size 32768 extends beyond EOD, truncated [ 755.149136][T29019] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 755.182397][T29019] loop0: p6 size 32768 extends beyond EOD, truncated [ 755.234958][T29033] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x2, 'veth1\x00', {0xffffff01}, 0x1e}) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 755.270812][T29033] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:07 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:07 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x7000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 755.319132][T29033] loop2: p4 size 32768 extends beyond EOD, truncated [ 755.340091][T29033] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 755.359464][T29033] loop2: p6 size 32768 extends beyond EOD, truncated 16:56:08 executing program 4: syz_read_part_table(0xa0000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:08 executing program 2: syz_read_part_table(0xff00, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:08 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:08 executing program 0: syz_read_part_table(0x9000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x225400, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$alg(r4, 0x0, 0x0, 0x1c0800) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) r5 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x12000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r7, 0xc040564a, &(0x7f00000000c0)={0x8001, 0x0, 0x2025, 0x6, 0x3f, 0x1, 0x200}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r5, 0x40bc5311, &(0x7f0000000140)={0x0, 0x3, 'client1\x00', 0xffffffff80000000, "f8f055e4dc0498c7", "a0c8ebe2ca6b12ca049613ecceb42d9b3e3d7d4a77525621c2ad2ee6977d65a8", 0xfffffff7, 0x80}) 16:56:08 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x8000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:08 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x9, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8040, 0x0) getsockname$netrom(r2, &(0x7f00000000c0)={{0x3, @default}, [@default, @default, @null, @rose, @default, @rose, @netrom, @null]}, &(0x7f0000000140)=0x48) r3 = dup2(r1, r1) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000180)={@dev={0xac, 0x14, 0x14, 0x13}, @empty}, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x3f, 0x2) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fstat(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r5, 0xffffffffffffffff, r8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) readv(r3, &(0x7f0000000100), 0x0) [ 756.465729][T29083] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 756.471718][T29079] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 756.479011][T29079] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 756.489498][T29083] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 756.517773][T29079] loop2: p4 size 32768 extends beyond EOD, truncated [ 756.551025][T29079] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 756.565210][T29082] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 756.571078][T29079] loop2: p6 size 32768 extends beyond EOD, truncated [ 756.578449][T29083] loop0: p4 size 32768 extends beyond EOD, truncated [ 756.583083][T29082] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 756.600448][T29083] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 756.626402][T29082] loop4: p4 size 32768 extends beyond EOD, truncated [ 756.645860][T29083] loop0: p6 size 32768 extends beyond EOD, truncated [ 756.653573][T29082] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 756.668240][T29082] loop4: p6 size 32768 extends beyond EOD, truncated 16:56:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000080)={0xfffffffa}) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:09 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:09 executing program 2: syz_read_part_table(0xff0f, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:09 executing program 0: syz_read_part_table(0x9000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:09 executing program 4: syz_read_part_table(0x900000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:09 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x10000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000200)={[], 0x2, 0x3f, 0x7f, 0x0, 0xfffffffffffff001, r1}) r2 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = open(&(0x7f0000000000)='./file0\x00', 0x214000, 0x100) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8200, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f00000000c0)={0x1, r4}) r5 = accept4(r2, 0x0, 0x0, 0x0) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) sendmmsg(r2, &(0x7f0000002800)=[{{&(0x7f0000000140)=@nfc={0x27, 0x1, 0x0, 0x1}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000400)=[{0x80, 0x1ab, 0x3e9c7cc, "d5029d49348731c28af60e8e090000000000000077d829c1dba4d9b45b3e0aa6cac25ce9102f989eb2449466b07681a6ad25ac9f54e991dbecd452bceb150f592c90c2c4eb3fe9ffa77ed61815c9a1e2cbe4d99083fd75e1159182809e204a85f17ee49627641b44bd2196"}, {0x68, 0x1, 0x1, "b645a47e608fc55baec019b780cdd4b387dd94db29342cd90ddcf330df1ad6e4f04477c1f9ee724fa234a3cb7f6e197cedf6a8480437b736e103510ca8566d10d70cd83193232fa4ce5d9c3fc5cb2d97a5cd0dc18f0e16e7"}], 0xe8}}, {{0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000002880)=ANY=[@ANYBLOB="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"], 0x12f8}}], 0x2, 0x0) 16:56:09 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 757.655091][T29138] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 757.725423][T29138] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x47) sendmsg$nfc_llcp(r1, &(0x7f0000000500)={&(0x7f0000000080)={0x27, 0x0, 0x0, 0x708323d9276a71bc, 0x6, 0xff, "c2802348ae504a396cada7e78ff914eab6f48c302f0a853a07f78721092fc86e03ed25a4ac799b5c9c5ebdf1e978d72a6d7d7afa265a1a818a8e49c8f70224", 0x3}, 0x60, &(0x7f00000003c0)=[{&(0x7f0000000140)="f2c90a7039ea2dc5919b37cb3ff4120c4f882c76eadb0a16c4bc9fcf69eb154bd447f5291e3e3f4f1f741d9814a23f212c8f540b219cba4b9c8e164914b35b249aa1fba146ad1ce9b9fd8b44979bb8d39ff7b8751028b2438314030a89787ed0bc4f73402cc89cfabd2a47fcefe197dac5205dd9b84a4d94121b6797a2b55ee08d33caac5395727d3573019d526f7c2efa5a096cc846395ac62011dac97b0bc280a17d556df77f454c6daf712a6e96344269fce73afc7402492b2fdd6eb04037fa5a4706e7f42cb9735b31f5f431e29801659923", 0xd4}, {&(0x7f0000000240)="55cfd7a6b12b0477147d3d8d", 0xc}, {&(0x7f0000000300)="5a6ec8572539bc2d69a64ec0de8feb42e33eac5ebad2bbd07314db73042c253d", 0x20}, {&(0x7f0000000340)="ff1bc142d33930748d57abeef197428e37af521889fd91bbfedc8db89e6bb4c41576e93db537fb0d4e61c1e7b4457dbfca97b0273a5d8b21abeb8caae9eccaa1040fd987c95e6c918ce71353b42cc2909e9496db1548bf90c76f2d170b8687dab1b06c", 0x63}], 0x4, &(0x7f0000000400)={0xf0, 0x10e, 0x6, "66601df1de063176649b41b940e9f5c75d2529fb47c0151af28c6ea4e9adc2271aae4a235397fe6f65a9141fc781708c364b6927df257868a893190c93ae297cf682c9edf40b77192aedd8e18dc6ee75421127d96a6ac77fa18f5a6230df3ea4f3bb86ee3e66603d116fbe01dbe218c9e3ea62316c09501cf51b0f0a3cd2d3efd3fb8a54087133708d14af5e7fb71c44fc3730d206771c71ab4af3028de8bddf58115066fbae81e11704876b95a5e62373bd41348c1f8085b3c52ea4fcbb8b9158718e1145d913f5ecf7c739eb5532c078e525b232b1c8a75418ad1057"}, 0xf0, 0x20000000}, 0x20000004) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000540)={0x8, 0x7, 0x0, [{0xfffffffffffffffd, 0xfffffffffffffff9, 0x487, 0x0, 0x1f, 0x8, 0x4}, {0x2fcc, 0x4, 0x6, 0x7, 0x7f, 0x7}, {0x20, 0x6, 0x0, 0x5, 0x2, 0x7, 0x4b}, {0x6, 0x0, 0x8000, 0xad, 0x0, 0x6f, 0x4}, {0x80000001, 0x0, 0xfffffffffffffff7, 0x8, 0x4, 0x6, 0xa0}, {0x8, 0x9, 0x3f, 0x20, 0x7f, 0x8a, 0x1}, {0x7, 0xc69e, 0x7, 0x3, 0x7, 0x7, 0x3f}]}) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x3f000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 757.800462][T29138] loop2: p4 size 32768 extends beyond EOD, truncated [ 757.840380][T29138] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 757.889380][T29138] loop2: p6 size 32768 extends beyond EOD, truncated 16:56:10 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x10, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 758.095350][T29161] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 758.114160][T29161] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 758.168935][T29161] loop0: p4 size 32768 extends beyond EOD, truncated [ 758.179221][T29154] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 758.216313][T29154] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 758.231678][T29161] loop0: p5 size 1073741824 extends beyond EOD, truncated 16:56:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000000c0)={0x3d, 0x6, 0x0, 0x0, 0xf5f, 0x7, 0x0, 0x2, 0xc0, 0x8, 0x7f, 0x45, 0x0, 0x9, 0x800, 0x20, 0x0, 0x4, 0x7f}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400000, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCRSGCAUSE(r7, 0x89e0, &(0x7f0000000180)) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x3, &(0x7f0000000080)=0x4) 16:56:10 executing program 2: syz_read_part_table(0xa0000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 758.258955][T29161] loop0: p6 size 32768 extends beyond EOD, truncated [ 758.310000][T29154] loop4: p4 size 32768 extends beyond EOD, truncated [ 758.387778][T29154] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 758.533997][T29154] loop4: p6 size 32768 extends beyond EOD, truncated [ 758.583935][ T2503] print_req_error: 44 callbacks suppressed [ 758.584001][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.584820][T29161] __loop_clr_fd: partition scan of loop0 failed (rc=-16) [ 758.589938][ T2503] buffer_io_error: 41 callbacks suppressed [ 758.589984][ T2503] Buffer I/O error on dev loop0p6, logical block 0, async page read 16:56:11 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x11, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 758.627158][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.639208][ T2503] Buffer I/O error on dev loop0p6, logical block 0, async page read [ 758.648436][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.659463][ T2503] Buffer I/O error on dev loop0p6, logical block 0, async page read [ 758.674922][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.686665][ T2503] Buffer I/O error on dev loop0p6, logical block 0, async page read [ 758.698364][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.709564][ T2503] Buffer I/O error on dev loop0p6, logical block 0, async page read [ 758.717981][ T2503] blk_update_request: I/O error, dev loop0, sector 24 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:56:11 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x80030000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 758.728992][ T2503] Buffer I/O error on dev loop0p6, logical block 3, async page read [ 758.737653][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.748647][ T2503] Buffer I/O error on dev loop0p6, logical block 0, async page read [ 758.760241][ T2504] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.771456][ T2504] Buffer I/O error on dev loop0p6, logical block 0, async page read [ 758.784902][ T2504] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.795964][ T2504] Buffer I/O error on dev loop0p6, logical block 0, async page read [ 758.810027][ T2504] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 758.821097][ T2504] Buffer I/O error on dev loop0p6, logical block 0, async page read 16:56:11 executing program 0: syz_read_part_table(0x9000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:11 executing program 4: syz_read_part_table(0x1000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x1) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='deflink\x00') sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r4, 0x2, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x8000) readv(r0, &(0x7f0000000100), 0x0) 16:56:11 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2c, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 759.096115][T29204] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000180)="4d1ed3d8b6e4d7bc3d5e810b315d10a3994be4734dca849ad90fe653c7637868db1518ddc277409858303171460dbe727ba15c912963c17cc60d73255d2089b38d9704bb4ef8fa8c816e0f6f691493e7f49e502c66ed795188a869eaaf1402b97462ca63d79a8a0830767b8d17709cee", 0x70) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x189) ioctl$TIOCGPKT(r4, 0x80045438, &(0x7f0000000080)) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 759.142727][T29204] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 759.174133][T29204] loop2: p4 size 32768 extends beyond EOD, truncated [ 759.225242][T29204] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 759.263878][T29204] loop2: p6 size 32768 extends beyond EOD, truncated 16:56:12 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xeffdffff, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 759.739190][T29221] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 759.755535][T29221] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0xc0800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/54, 0x36}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x724b) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$bt_BT_VOICE(r7, 0x112, 0xb, &(0x7f00000000c0)=0x60, 0xfffffffffffffebb) 16:56:12 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x33, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 759.796298][T29221] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 759.823061][T29223] loop0: p1 < > p2 p3 < p5 p6 > p4 16:56:12 executing program 2: syz_read_part_table(0x900000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 759.840790][T29223] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 759.864378][T29223] loop0: p4 size 32768 extends beyond EOD, truncated [ 759.909335][T29223] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 759.954818][T29223] loop0: p6 size 32768 extends beyond EOD, truncated 16:56:12 executing program 4: syz_read_part_table(0x2000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-arm64\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURB(r2, 0x4008550c, &(0x7f0000000080)) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:12 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3a, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:12 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xfeffffff, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:12 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) splice(r5, &(0x7f00000000c0)=0x4, r2, &(0x7f0000000100)=0x404, 0x6, 0xa) write$FUSE_CREATE_OPEN(r4, &(0x7f00000004c0)={0xa0, 0x0, 0x0, {{0x2, 0x0, 0x101, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}, 0xa0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x2000000000a, 0x0) 16:56:12 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x48, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 760.566225][T29273] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 760.603541][T29273] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 760.710495][T29273] loop2: p4 size 32768 extends beyond EOD, truncated [ 760.760980][T29273] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000000c0)={'nr0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$alg(r4, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(sm4-ce)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r5 = accept4(r0, 0x0, 0x0, 0x0) connect$x25(r5, &(0x7f0000000140)={0x9, @remote={[], 0x3}}, 0x12) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000080)={0x0, 0x80000000}, 0x8) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r9, 0x401070cd, &(0x7f0000000180)={0x100}) [ 760.811123][T29273] loop2: p6 size 32768 extends beyond EOD, truncated [ 760.898822][T29301] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 760.964852][T29301] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 761.095841][T29301] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:13 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4c, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:13 executing program 2: syz_read_part_table(0x1000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:13 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xff000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @multicast1}], 0x30) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000000)={r0, 0x6}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:13 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x60, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:14 executing program 4: syz_read_part_table(0x3000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:14 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000140)={{}, {0x0, 0x989680}}, 0x0) dup3(r0, r1, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xb, 0x0, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x12, 0xfffffffffffffff7, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x1d}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)={0xa0002005}) [ 761.948165][T29346] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:14 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x68, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x420401, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0xfffffffffffffeaf) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 761.984431][T29346] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 762.060861][T29346] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:14 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xfffffdef, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 762.204634][T29374] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 762.221185][T29374] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 762.256386][T29374] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:14 executing program 2: syz_read_part_table(0x2000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:14 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6c, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000000)={0xfffffffffffffffb}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001200)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x800) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000080)=0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) readv(r5, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/253, 0xfd}, {&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000300)=""/113, 0x71}, {&(0x7f0000000380)=""/159, 0x9f}, {&(0x7f0000000440)=""/82, 0xfe5f}], 0x6) 16:56:14 executing program 4: syz_read_part_table(0x4000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:15 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xfffffffe, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:15 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x74, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 762.983676][T29416] loop4: p1 < > p2 p3 < p5 p6 > p4 16:56:15 executing program 0: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000280), 0xffd0, 0x0, 0x0, 0xfffffffffffffdd5) [ 763.069301][T29416] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 763.175165][T29416] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) r2 = request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)='hash\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, r2) accept4$packet(r1, 0x0, &(0x7f0000000000), 0x80d789fc065c0261) [ 763.345100][T29419] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 763.357894][T29419] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:15 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x78, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 763.452160][T29419] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:15 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x7ffffffff000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:16 executing program 4: syz_read_part_table(0x5000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:16 executing program 2: syz_read_part_table(0x3000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:16 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x29, 0x24, &(0x7f0000000000)="0004d300", 0x4) 16:56:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2ca480, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:16 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7a, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:16 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) lstat(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="23be68d373c8000000001250d3a10fd630600000ad44a335b696b6868313b60e0cf59e7a188a1927f461a393bd"], 0x2d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000140)}}], 0x0, 0x0, 0x0}) [ 764.128462][T29475] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 764.158484][T29475] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 764.176192][T29475] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:16 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfc, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:16 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x1000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="fb0000006600010abfa9d345e7eb8dfe204ee2d7080000000600000000000000801d5291d76b8c67452107132daffa33021eb82169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c33b047f720f4e89978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366ccec93f9fb8f100437172ff070000000000008e9234feee7baa2acd2683d489e1cadfd1a06f990000000000000000", 0xfb}], 0x1}, 0x0) close(0xffffffffffffffff) r2 = openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) getpid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000340)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 764.675430][T29491] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 764.707810][T29491] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 764.780187][T29491] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:17 executing program 4: syz_read_part_table(0x6000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:17 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x103, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 764.893850][T29524] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.0'. [ 764.998780][T29524] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.0'. 16:56:17 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x7ffffffffffff, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:17 executing program 2: syz_read_part_table(0x4000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:17 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x300, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000180)=""/208, 0xd0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2769, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r3, 0x0, 0x4a, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) [ 765.395987][T29534] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 765.431146][T29534] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 765.518033][T29534] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:18 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x301, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:18 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xf0ffffff7f0000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000180)=""/208, 0xd0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2769, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r3, 0x0, 0x4a, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) 16:56:18 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3ef, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 766.012490][T29559] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:18 executing program 4: syz_read_part_table(0x7000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 766.056494][T29559] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 766.118995][T29559] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:18 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4d8, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000180)=""/208, 0xd0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2769, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r3, 0x0, 0x4a, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) 16:56:18 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x100000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:18 executing program 2: syz_read_part_table(0x5000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 766.715565][T29597] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 766.742029][T29597] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:19 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x500, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 766.793904][T29597] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:19 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x598, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:19 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x200000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:19 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 767.371823][T29621] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:19 executing program 4: syz_read_part_table(0x8000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 767.403201][T29621] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 767.428949][T29621] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:20 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5c8, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:20 executing program 2: syz_read_part_table(0x6000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:20 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x300000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:20 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x600, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 768.075637][T29664] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 768.083842][T29664] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 768.107962][T29664] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 768.365451][T29682] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 768.373975][T29682] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 768.455183][T29682] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:20 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x700, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:21 executing program 4: syz_read_part_table(0x9000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) lseek(r0, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r3, r4) ioctl$sock_ifreq(r4, 0x8913, &(0x7f0000000040)={'ip_vti0\x00', @ifru_names='veth0\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r5, r6) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r8, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r7, r8) r9 = dup3(r5, r8, 0x80000) getsockname$packet(r9, &(0x7f0000000080), &(0x7f0000000200)=0x14) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r10, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r10, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 16:56:21 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x400000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:21 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x763, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:21 executing program 2: syz_read_part_table(0x7000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 769.184725][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 769.190510][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 769.237430][T29780] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 769.250831][T29780] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 769.266560][T29780] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:21 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x900, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:21 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x500000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 769.664730][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 769.670519][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 769.735254][T29796] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:22 executing program 4: syz_read_part_table(0xbe5a941, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 769.792251][T29796] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:22 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x987, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 769.834726][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 769.840540][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 769.843896][T29796] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 770.144733][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 770.150561][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:56:22 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x600000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:22 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:22 executing program 2: syz_read_part_table(0x8000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 770.615415][T29830] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 770.627918][T29830] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:23 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 770.679105][T29830] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:23 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x700000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) lseek(r0, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r3, r4) ioctl$sock_ifreq(r4, 0x8913, &(0x7f0000000040)={'ip_vti0\x00', @ifru_names='veth0\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r5, r6) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r8, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r7, r8) r9 = dup3(r5, r8, 0x80000) getsockname$packet(r9, &(0x7f0000000080), &(0x7f0000000200)=0x14) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r10, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r10, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) [ 771.185751][T29841] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 771.214988][T29841] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:23 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf1f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 771.284114][T29841] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:23 executing program 4: syz_read_part_table(0x10000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:24 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x800000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:24 executing program 2: syz_read_part_table(0x9000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:24 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf47, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 771.744731][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 771.750507][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 771.885574][T29883] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 771.921559][T29883] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 771.946047][T29889] print_req_error: 288 callbacks suppressed [ 771.946071][T29889] blk_update_request: I/O error, dev loop2, sector 262016 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 771.964902][T29894] blk_update_request: I/O error, dev loop2, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 771.977814][T29892] blk_update_request: I/O error, dev loop2, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 771.985895][T29896] blk_update_request: I/O error, dev loop2, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 771.990730][T29893] blk_update_request: I/O error, dev loop2, sector 262016 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 772.001896][T29890] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 772.026784][T10685] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 772.039283][T29883] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 772.054921][ T2504] blk_update_request: I/O error, dev loop2, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 772.066375][ T2504] buffer_io_error: 284 callbacks suppressed [ 772.066388][ T2504] Buffer I/O error on dev loop2p6, logical block 4080, async page read [ 772.080873][T29892] blk_update_request: I/O error, dev loop2, sector 32752 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 772.089693][ T2503] blk_update_request: I/O error, dev loop2, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 772.103826][ T2503] Buffer I/O error on dev loop2p4, logical block 4080, async page read [ 772.114217][T29894] blk_update_request: I/O error, dev loop2, sector 32752 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 772.146051][ T2504] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 772.154238][ T2504] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 772.162450][ T2504] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 772.170789][ T2504] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 772.179018][ T2504] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 772.187061][ T2504] Buffer I/O error on dev loop2p2, logical block 32752, async page read [ 772.195625][ T2504] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 772.203641][ T2504] Buffer I/O error on dev loop2p2, logical block 32766, async page read 16:56:24 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffa, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:24 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x1000000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:25 executing program 4: syz_read_part_table(0x1f000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 772.638566][T29903] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:25 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1100, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 772.699367][T29903] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) lseek(r0, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r3, r4) ioctl$sock_ifreq(r4, 0x8913, &(0x7f0000000040)={'ip_vti0\x00', @ifru_names='veth0\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r5, r6) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r8, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r7, r8) r9 = dup3(r5, r8, 0x80000) getsockname$packet(r9, &(0x7f0000000080), &(0x7f0000000200)=0x14) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r10, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r10, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) [ 772.804994][T29903] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:25 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x3f00000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:25 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x14b7, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 773.158301][T29928] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 773.173373][T29928] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:25 executing program 2: syz_read_part_table(0xbe5a941, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 773.254261][T29928] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:25 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x172b, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:26 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x8000000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:26 executing program 4: syz_read_part_table(0x20000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:26 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x17de, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 774.004921][T29950] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 774.024977][T29950] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 774.065602][T29950] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) lseek(r0, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000000000000a00000100000000ff020000000000000000000000000001000000000000000000000000000000000000000000000000009b002000000000000000000000000000000000000000000000000000000000000000000000000000000014000000000000000000000000004cbdd4bc6b10feda00000000000000000000000000000000000000020000000a00000000000000fe8000000000000000000000000000ff0000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000b3010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008d0000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000007a7637f935527d2e2f2b420079a5c142e6ae35893a9767a32e351394a9129839e1b3bce6303cf906c2d5e351661b22b40f09abb55073f96f595c76ec2c826a221c9a97505b0986d93cc8352289c61fad2fdd7f991516dfbb4289d0fe32a6101be732"], 0x190) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r3, r4) ioctl$sock_ifreq(r4, 0x8913, &(0x7f0000000040)={'ip_vti0\x00', @ifru_names='veth0\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r5, r6) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r8, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r7, r8) r9 = dup3(r5, r8, 0x80000) getsockname$packet(r9, &(0x7f0000000080), &(0x7f0000000200)=0x14) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r10, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r10, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 16:56:26 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x8003000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 774.366275][T29977] loop4: p1 < > p2 p3 < p5 p6 > p4 16:56:26 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1a4f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 774.387685][T29977] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 774.431596][T29977] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:26 executing program 2: syz_read_part_table(0x10000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:27 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1f0f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:27 executing program 4: syz_read_part_table(0x23000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:27 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xeffdffffffffffff, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:27 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1fc2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 775.184739][ C0] net_ratelimit: 8 callbacks suppressed [ 775.184751][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 775.196136][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 775.335403][T30011] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 775.360578][T30011] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 775.413037][T30011] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:27 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1fe7, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 775.516523][T30025] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 775.533955][T30025] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) lseek(r0, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r3, r4) ioctl$sock_ifreq(r4, 0x8913, &(0x7f0000000040)={'ip_vti0\x00', @ifru_names='veth0\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r5, r6) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r8, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(r7, r8) r9 = dup3(r5, r8, 0x80000) getsockname$packet(r9, &(0x7f0000000080), &(0x7f0000000200)=0x14) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r10, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r10, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) [ 775.576473][T30025] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xfeffffff00000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:28 executing program 2: syz_read_part_table(0x20000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:28 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x257f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:28 executing program 4: syz_read_part_table(0x3d0f0000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:28 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x27a6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 776.384809][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 776.390607][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:56:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xff00000000000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 776.609528][T30071] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 776.626604][T30071] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:29 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2b17, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 776.659507][T30071] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 776.675288][T30070] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 776.692991][T30070] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 776.739112][T30070] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:29 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xffffffff00000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) creat(0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000003100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) [ 777.080194][T30089] print_req_error: 540 callbacks suppressed [ 777.080258][T30089] blk_update_request: I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 777.085711][T30093] blk_update_request: I/O error, dev loop2, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 777.090055][ T2504] blk_update_request: I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 777.107023][T30090] blk_update_request: I/O error, dev loop2, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 777.109802][ T2504] buffer_io_error: 526 callbacks suppressed [ 777.109835][ T2504] Buffer I/O error on dev loop2p5, logical block 33008, async page read [ 777.125340][T30092] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 777.132629][T30089] blk_update_request: I/O error, dev loop2, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 16:56:29 executing program 4: syz_read_part_table(0x3f000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 777.139184][T30091] blk_update_request: I/O error, dev loop2, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 777.149238][T30070] __loop_clr_fd: partition scan of loop2 failed (rc=-16) [ 777.194344][ T2503] blk_update_request: I/O error, dev loop2, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:56:29 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2c00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 777.224780][ T2503] Buffer I/O error on dev loop2p4, logical block 4080, async page read [ 777.243898][T30093] blk_update_request: I/O error, dev loop2, sector 32752 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 777.268533][ T2504] blk_update_request: I/O error, dev loop2, sector 264176 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 777.282690][ T2504] Buffer I/O error on dev loop2p5, logical block 33022, async page read [ 777.291571][ T2504] Buffer I/O error on dev loop2p5, logical block 0, async page read [ 777.299788][ T2504] Buffer I/O error on dev loop2p5, logical block 1, async page read [ 777.307951][ T2504] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 777.316105][ T2504] Buffer I/O error on dev loop2p6, logical block 4080, async page read [ 777.324379][ T2504] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 777.334819][ T2504] Buffer I/O error on dev loop2p6, logical block 4094, async page read [ 777.343144][ T2504] Buffer I/O error on dev loop2p3, logical block 0, async page read 16:56:30 executing program 2: syz_read_part_table(0x23000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:30 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2f8a, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 777.853700][T30115] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 777.875589][T30115] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:30 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xffffffffffff0700, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 777.917265][T30115] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) creat(0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000003100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) 16:56:30 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x30af, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 778.200565][T30121] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 778.266360][T30121] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 778.345115][T30121] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:30 executing program 4: syz_read_part_table(0x40000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:30 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0xfffffffffffffdef, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:31 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3300, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:31 executing program 2: syz_read_part_table(0x3f000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:31 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="03010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 779.226755][T30156] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 779.243410][T30156] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000700)=[{&(0x7f0000000180)=""/208, 0xd0}, {0x0, 0x2d5}, {0x0, 0xffca}, {0x0}, {0x0}, {0x0}, {0x0, 0x1a6}, {0x0}, {0x0}], 0x9) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2769, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) 16:56:31 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3647, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 779.316100][T30156] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 779.495371][T30171] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 779.504263][T30171] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 779.532112][T30171] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:32 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x376e, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:32 executing program 4: syz_read_part_table(0x41a9e50b, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:32 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="05010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:32 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3300, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:32 executing program 2: syz_read_part_table(0x40000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:32 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3a00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 780.345391][T30201] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 780.359692][T30201] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:32 executing program 0: syz_read_part_table(0x3f000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 780.408683][T30201] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:32 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3bdf, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:32 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="06010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 780.558587][T30216] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 780.612049][T30216] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 780.698330][T30216] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:33 executing program 4: syz_read_part_table(0x48000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:33 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3f00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 781.025072][T30229] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 781.055353][T30229] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 781.092082][T30229] loop0: p5 size 1073741824 extends beyond EOD, truncated 16:56:33 executing program 2: syz_read_part_table(0x41a9e50b, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:33 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="08010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:33 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3f52, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 781.589342][T30253] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 781.627758][T30253] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:34 executing program 0: syz_read_part_table(0x23000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 781.685620][T30253] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:34 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 781.827709][T30262] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:34 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="10010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 781.868115][T30262] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 781.926950][T30262] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:34 executing program 4: syz_read_part_table(0x4c000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$vnet(r1, &(0x7f00000001c0)={0x1, {&(0x7f0000000040)=""/160, 0xa0, &(0x7f0000000100)=""/138, 0x1, 0x2}}, 0x68) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x400) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r4, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r5) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000400)={0x80000001, 0x0, 0x1, 0x300}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000440)={0x7, r6, 0x10001, 0xb74e}) setresgid(0x0, 0x0, r5) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r7) setresgid(0x0, 0x0, r7) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r8) setresgid(0x0, 0x0, r8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r9) setresgid(0x0, 0x0, r9) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r10) setresgid(0x0, 0x0, r10) getgroups(0x7, &(0x7f0000000300)=[r5, r7, 0x0, r8, r9, 0xffffffffffffffff, r10]) write$P9_RGETATTR(r2, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0xa, {0x40, 0x0, 0x6}, 0x16, r4, r11, 0x4, 0x3, 0x200, 0x0, 0xf814, 0x2826, 0x44, 0x1f, 0x3, 0x400, 0x0, 0xfffffffffffff800, 0x6, 0xec29, 0x800}}, 0xa0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r12 = accept4(r0, 0x0, 0x0, 0x0) readv(r12, &(0x7f0000000100), 0x1000000000000227) 16:56:34 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4177, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 782.384814][T30275] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 782.430554][T30275] loop0: p2 size 1073741824 extends beyond EOD, truncated 16:56:34 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="24010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 782.539569][T30275] loop0: p5 size 1073741824 extends beyond EOD, truncated 16:56:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0xb) getsockopt$SO_J1939_SEND_PRIO(r5, 0x6b, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000080)={r6, 0x2}) r7 = accept4(r0, 0x0, 0x0, 0x0) readv(r7, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:35 executing program 2: syz_read_part_table(0x48000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 782.747726][T30292] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 782.776418][T30292] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:35 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x470f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 782.830982][T30292] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:35 executing program 0: syz_read_part_table(0x41a9e50b, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:35 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02020500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:35 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4736, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:35 executing program 4: syz_read_part_table(0x60000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 783.395581][T30326] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 783.428285][T30326] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/44, 0x2c}], 0x2) [ 783.490808][T30326] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:36 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x47e9, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:36 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02030500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 783.814911][T30344] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 783.826438][T30344] loop0: p2 size 1073741824 extends beyond EOD, truncated 16:56:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x101040, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x0) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getcwd(&(0x7f0000000140)=""/129, 0x81) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 783.870945][T30344] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 783.981863][T30358] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 783.990874][T30358] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:36 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4800, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 784.039752][T30358] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:36 executing program 2: syz_read_part_table(0x4c000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYPTR64], 0x1) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:36 executing program 0: syz_read_part_table(0x23000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:36 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4c00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:36 executing program 4: syz_read_part_table(0x68000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:37 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02050500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0xffffffffffffff62) r2 = accept4(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:37 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4ca7, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 784.823585][T30394] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 784.886623][T30394] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 784.911738][T30394] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 784.992427][T30397] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 785.012157][T30397] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 785.023937][T30405] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 785.030584][T30405] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 785.045350][T30397] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 785.058676][T30405] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:37 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4f1a, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) socket$key(0xf, 0x3, 0x2) accept4(r2, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80, 0x80800) 16:56:37 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="020f0500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:37 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4fcd, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 785.397930][ T2503] print_req_error: 529 callbacks suppressed [ 785.397950][ T2503] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.416016][T30427] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.427318][T30427] buffer_io_error: 516 callbacks suppressed [ 785.427329][T30427] Buffer I/O error on dev loop0p2, logical block 33008, async page read [ 785.441600][T30427] blk_update_request: I/O error, dev loop0, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 785.452871][T30427] blk_update_request: I/O error, dev loop0, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.464148][T30427] Buffer I/O error on dev loop0p4, logical block 4080, async page read [ 785.467162][T30397] __loop_clr_fd: partition scan of loop0 failed (rc=-16) [ 785.472448][T30427] blk_update_request: I/O error, dev loop0, sector 264176 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.490823][T30427] Buffer I/O error on dev loop0p2, logical block 33022, async page read [ 785.499264][T30427] blk_update_request: I/O error, dev loop0, sector 32752 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.510524][T30427] Buffer I/O error on dev loop0p4, logical block 4094, async page read [ 785.518969][T30427] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.529836][T30427] Buffer I/O error on dev loop0p2, logical block 0, async page read [ 785.537895][T30427] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.548778][T30427] Buffer I/O error on dev loop0p4, logical block 0, async page read [ 785.556853][T30427] blk_update_request: I/O error, dev loop0, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.567732][T30427] Buffer I/O error on dev loop0p2, logical block 1, async page read [ 785.575821][T30427] blk_update_request: I/O error, dev loop0, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 785.586964][T30427] Buffer I/O error on dev loop0p4, logical block 1, async page read [ 785.595157][T30427] Buffer I/O error on dev loop0p2, logical block 33023, async page read [ 785.603569][T30427] Buffer I/O error on dev loop0p4, logical block 4095, async page read 16:56:38 executing program 2: syz_read_part_table(0x60000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:38 executing program 4: syz_read_part_table(0x6c000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:38 executing program 0: syz_read_part_table(0x23000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:38 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x523f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:38 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x57b1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:38 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:38 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02100500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 786.505164][T30465] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 786.546900][T30465] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 786.565629][T30469] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 786.652517][T30471] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 786.659360][T30465] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 786.670045][T30471] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 786.690827][T30471] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:39 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x57d7, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) mq_notify(r2, &(0x7f0000000180)={0x0, 0x4, 0x4, @tid=r6}) 16:56:39 executing program 4: syz_read_part_table(0x74000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:39 executing program 0: syz_read_part_table(0x23000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:39 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02240500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:39 executing program 2: syz_read_part_table(0x68000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:39 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5d6f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x400) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x166}], 0x315) prctl$PR_CAPBSET_DROP(0x18, 0x19) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = dup2(r1, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) fcntl$dupfd(r2, 0x203, r3) [ 787.354831][ T7585] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 787.555485][T30529] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 787.562390][T30529] loop0: p2 size 1073741824 extends beyond EOD, truncated 16:56:40 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5f95, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 787.613288][T30529] loop0: p5 size 1073741824 extends beyond EOD, truncated 16:56:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x7, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', r3}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 788.018403][T30544] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 788.045942][T30544] loop2: p2 size 1073741824 extends beyond EOD, truncated 16:56:40 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02011000000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:40 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 788.161441][T30544] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 788.369085][T30545] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 788.457573][T30545] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:40 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6307, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 788.536408][T30545] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:41 executing program 4: syz_read_part_table(0x7a000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:41 executing program 2: syz_read_part_table(0x6c000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x8361f5f1ed785d58, 0x0, &(0x7f0000000480)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) readv(r1, &(0x7f00000000c0), 0x200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$TIPC_GROUP_LEAVE(r4, 0x10f, 0x88) r5 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000040)={0x100000, &(0x7f0000000000), 0xe, r5, 0x4}) 16:56:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) mq_notify(r2, &(0x7f0000000180)={0x0, 0x4, 0x4, @tid=r6}) 16:56:41 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02012400000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:41 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6779, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 16:56:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001740)=[{&(0x7f0000000300)=""/135}, {&(0x7f0000000000)=""/60}, {&(0x7f00000003c0)=""/197}, {&(0x7f00000004c0)=""/114}, {&(0x7f0000000540)=""/197}, {&(0x7f0000000640)=""/251}, {&(0x7f0000000740)=""/4096}, {&(0x7f0000000240)=""/12}], 0x100000000000020e) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/\x00\b\x00\tdsp\x00', 0x82000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r4, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f00000000c0)={0x30, 0x8, &(0x7f0000000140)="3ac25e9fa448aa384753ce53f9e7d53d0fdb9b9a93cbf8c56f55912164e4198427c42e55a5c944257635286ab53926b02dd2f1fe44a90ade0f8b141993db67bd65a75c146cf96353261b8c16b4f06bbfa65c70f1898107a4661c595c001a747df6bd662b31fa383ec358114d93358c476193266c96a68c2124174bafb3b412a261cb537b2b80b868d7713fe28c9a82ee8a15d4c58a9bb5024bb60e5c7360b2bc75cab3b1f81cdce26bb4d3a42feb17a6aafb7386", {0xf8, 0x8, 0x3136564e, 0x7, 0x10001, 0x59fc, 0xa, 0x200}}) ioctl$DRM_IOCTL_AUTH_MAGIC(r6, 0x40046411, &(0x7f0000000080)=0x8004003) ioctl$VT_DISALLOCATE(r2, 0x5608) [ 789.105536][T30604] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:41 executing program 0: syz_read_part_table(0x68000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 789.139431][T30604] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 789.216952][T30604] loop2: p5 size 1073741824 extends beyond EOD, truncated 16:56:41 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6800, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 789.359502][T30613] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 789.403452][T30613] loop4: p2 size 1073741824 extends beyond EOD, truncated 16:56:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r2, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(morus1280-avx2)\x00'}, 0xfffffffffffffefd) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) [ 789.443753][T30613] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:42 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010502000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:42 executing program 2: syz_read_part_table(0x74000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:42 executing program 4: syz_read_part_table(0x97ffffff, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 789.814972][T30634] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 789.830386][T30634] loop0: p2 size 1073741824 extends beyond EOD, truncated 16:56:42 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x689f, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 790.005148][T30634] loop0: p5 size 1073741824 extends beyond EOD, truncated 16:56:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$CAPI_REGISTER(r3, 0x400c4301, &(0x7f0000000000)={0x7, 0x2, 0x3}) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:42 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010503000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 790.305696][T30664] loop2: p1 < > p2 p3 < p5 p6 > p4 16:56:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r2, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(morus1280-avx2)\x00'}, 0xfffffffffffffefd) r3 = accept4(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:42 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6c00, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 790.355301][T30664] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 790.415562][T30672] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 790.446735][T30672] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 790.481530][T30664] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 790.507161][T30672] loop4: p5 size 1073741824 extends beyond EOD, truncated 16:56:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0xc0800) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x1c}], 0x1) 16:56:43 executing program 2: syz_read_part_table(0x7a000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:43 executing program 0: syz_read_part_table(0x7a000000, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:43 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6e37, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 790.963501][ T7562] ================================================================== [ 790.971661][ T7562] BUG: KCSAN: data-race in __dentry_kill / d_alloc_parallel [ 790.978931][ T7562] [ 790.981266][ T7562] read to 0xffff8881256f0240 of 4 bytes by task 15962 on cpu 1: [ 790.988908][ T7562] __dentry_kill+0x1be/0x3c0 [ 790.993500][ T7562] dput+0x3b5/0x750 [ 790.997315][ T7562] terminate_walk+0x107/0x250 [ 791.002001][ T7562] path_lookupat.isra.0+0x27e/0x5a0 [ 791.007224][ T7562] filename_lookup+0x145/0x2b0 [ 791.012003][ T7562] user_path_at_empty+0x4c/0x70 [ 791.016874][ T7562] vfs_statx+0xd9/0x190 [ 791.021048][ T7562] __do_sys_newstat+0x51/0xb0 [ 791.025727][ T7562] __x64_sys_newstat+0x3a/0x50 [ 791.030499][ T7562] do_syscall_64+0xcc/0x370 [ 791.035015][ T7562] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 791.040899][ T7562] [ 791.043239][ T7562] write to 0xffff8881256f0240 of 4 bytes by task 7562 on cpu 0: [ 791.050878][ T7562] d_alloc_parallel+0x533/0xe00 [ 791.055736][ T7562] __lookup_slow+0xb4/0x2a0 [ 791.060253][ T7562] lookup_slow+0x4f/0x70 [ 791.064505][ T7562] walk_component+0x4a2/0xe70 [ 791.069192][ T7562] path_lookupat.isra.0+0x13a/0x5a0 [ 791.074399][ T7562] filename_lookup+0x145/0x2b0 [ 791.079170][ T7562] user_path_at_empty+0x4c/0x70 [ 791.084033][ T7562] do_readlinkat+0x84/0x220 [ 791.088539][ T7562] __x64_sys_readlink+0x51/0x70 [ 791.093431][ T7562] do_syscall_64+0xcc/0x370 [ 791.097946][ T7562] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 791.103828][ T7562] [ 791.106151][ T7562] Reported by Kernel Concurrency Sanitizer on: [ 791.112322][ T7562] CPU: 0 PID: 7562 Comm: udevd Not tainted 5.4.0-syzkaller #0 [ 791.119771][ T7562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.130519][ T7562] ================================================================== [ 791.138587][ T7562] Kernel panic - not syncing: panic_on_warn set ... [ 791.145183][ T7562] CPU: 0 PID: 7562 Comm: udevd Not tainted 5.4.0-syzkaller #0 [ 791.152643][ T7562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:56:43 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010504000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 16:56:43 executing program 4: syz_read_part_table(0xc9ffffff, 0xaaaaaaaaaaaacc6, &(0x7f0000000100)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 791.162696][ T7562] Call Trace: [ 791.166008][ T7562] dump_stack+0x11d/0x181 [ 791.170352][ T7562] panic+0x210/0x640 [ 791.174258][ T7562] ? vprintk_func+0x8d/0x140 [ 791.178870][ T7562] kcsan_report.cold+0xc/0xd [ 791.183474][ T7562] kcsan_setup_watchpoint+0x3fe/0x460 [ 791.188878][ T7562] __tsan_unaligned_write4+0xc4/0x100 [ 791.194365][ T7562] d_alloc_parallel+0x533/0xe00 [ 791.199224][ T7562] ? __read_once_size+0x5a/0xe0 [ 791.204085][ T7562] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 791.209989][ T7562] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 791.215894][ T7562] ? __d_lookup+0x2b0/0x3f0 [ 791.220404][ T7562] ? dput+0xab/0x750 [ 791.224317][ T7562] __lookup_slow+0xb4/0x2a0 [ 791.228839][ T7562] lookup_slow+0x4f/0x70 [ 791.233096][ T7562] walk_component+0x4a2/0xe70 [ 791.237788][ T7562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.244043][ T7562] ? link_path_walk.part.0+0x77f/0xa90 [ 791.249527][ T7562] path_lookupat.isra.0+0x13a/0x5a0 [ 791.254821][ T7562] ? __read_once_size.constprop.0+0x12/0x20 [ 791.260723][ T7562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 791.266975][ T7562] filename_lookup+0x145/0x2b0 [ 791.271758][ T7562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 791.278005][ T7562] ? strncpy_from_user+0x219/0x2b0 [ 791.283128][ T7562] ? getname_flags+0x1a4/0x380 [ 791.287906][ T7562] user_path_at_empty+0x4c/0x70 [ 791.292794][ T7562] do_readlinkat+0x84/0x220 [ 791.297494][ T7562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 791.303751][ T7562] __x64_sys_readlink+0x51/0x70 [ 791.308625][ T7562] do_syscall_64+0xcc/0x370 [ 791.313140][ T7562] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 791.319037][ T7562] RIP: 0033:0x7f2db3f49577 [ 791.323458][ T7562] Code: f0 ff ff 77 02 f3 c3 48 8b 15 bd 38 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 91 38 2b 00 31 d2 48 29 c2 64 [ 791.343064][ T7562] RSP: 002b:00007ffd2cd246d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 791.351487][ T7562] RAX: ffffffffffffffda RBX: 00000000011cd250 RCX: 00007f2db3f49577 [ 791.359463][ T7562] RDX: 0000000000000400 RSI: 00007ffd2cd246e0 RDI: 00007ffd2cd24bc0 [ 791.367443][ T7562] RBP: 00000000011cdd30 R08: 7665642f7379732f R09: 7269762f73656369 [ 791.375414][ T7562] R10: 6f6c622f6c617574 R11: 0000000000000246 R12: 00007ffd2cd24bc0 [ 791.383384][ T7562] R13: 0000000000000400 R14: 00000000011cd250 R15: 000000000000000b [ 791.392765][ T7562] Kernel Offset: disabled [ 791.397093][ T7562] Rebooting in 86400 seconds..