loop0: p1 p2 p3 p4 p4: ttyprintk ttyprintk: tty_port_close_start: tty->count = 1 port count = 3 loop1: p2 start 25 is beyond EOD, ====================================================== WARNING: possible circular locking dependency detected 4.14.210-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.4/31035 is trying to acquire lock: (console_owner){-.-.}, at: [] console_trylock_spinning kernel/printk/printk.c:1658 [inline] (console_owner){-.-.}, at: [] vprintk_emit+0x32a/0x620 kernel/printk/printk.c:1922 but task is already holding lock: (&(&port->lock)->rlock){-.-.}, at: [] tty_port_close_start.part.0+0x28/0x4c0 drivers/tty/tty_port.c:573 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (&(&port->lock)->rlock){-.-.}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:160 tty_port_tty_get+0x1d/0x80 drivers/tty/tty_port.c:288 tty_port_default_wakeup+0x11/0x40 drivers/tty/tty_port.c:46 serial8250_tx_chars+0x3fe/0xbf0 drivers/tty/serial/8250/8250_port.c:1810 serial8250_handle_irq.part.0+0x28d/0x330 drivers/tty/serial/8250/8250_port.c:1897 serial8250_handle_irq drivers/tty/serial/8250/8250_port.c:1870 [inline] serial8250_default_handle_irq+0x8a/0x1f0 drivers/tty/serial/8250/8250_port.c:1913 serial8250_interrupt+0xf3/0x210 drivers/tty/serial/8250/8250_core.c:129 __handle_irq_event_percpu+0xee/0x7f0 kernel/irq/handle.c:147 handle_irq_event_percpu kernel/irq/handle.c:187 [inline] handle_irq_event+0xf0/0x246 kernel/irq/handle.c:204 handle_edge_irq+0x224/0xc40 kernel/irq/chip.c:770 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x35/0x50 arch/x86/kernel/irq_64.c:87 do_IRQ+0x93/0x1d0 arch/x86/kernel/irq.c:230 ret_from_intr+0x0/0x1e native_safe_halt+0xe/0x10 arch/x86/include/asm/irqflags.h:60 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline] default_idle+0x47/0x370 arch/x86/kernel/process.c:558 cpuidle_idle_call kernel/sched/idle.c:156 [inline] do_idle+0x250/0x3c0 kernel/sched/idle.c:246 cpu_startup_entry+0x14/0x20 kernel/sched/idle.c:351 start_kernel+0x750/0x770 init/main.c:708 secondary_startup_64+0xa5/0xb0 arch/x86/kernel/head_64.S:240 -> #1 (&port_lock_key){-.-.}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:160 serial8250_console_write+0x7a7/0x9d0 drivers/tty/serial/8250/8250_port.c:3253 call_console_drivers kernel/printk/printk.c:1725 [inline] console_unlock+0x99d/0xf20 kernel/printk/printk.c:2400 vprintk_emit+0x224/0x620 kernel/printk/printk.c:1923 vprintk_func+0x58/0x152 kernel/printk/printk_safe.c:401 printk+0x9e/0xbc kernel/printk/printk.c:1996 register_console+0x6f4/0xad0 kernel/printk/printk.c:2719 univ8250_console_init+0x2f/0x3a drivers/tty/serial/8250/8250_core.c:691 console_init+0x46/0x53 kernel/printk/printk.c:2800 start_kernel+0x52e/0x770 init/main.c:634 secondary_startup_64+0xa5/0xb0 arch/x86/kernel/head_64.S:240 -> #0 (console_owner){-.-.}: lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 console_trylock_spinning kernel/printk/printk.c:1679 [inline] vprintk_emit+0x367/0x620 kernel/printk/printk.c:1922 vprintk_func+0x58/0x152 kernel/printk/printk_safe.c:401 printk+0x9e/0xbc kernel/printk/printk.c:1996 tty_port_close_start.part.0+0x46c/0x4c0 drivers/tty/tty_port.c:575 tty_port_close_start drivers/tty/tty_port.c:647 [inline] tty_port_close+0x3b/0x130 drivers/tty/tty_port.c:640 tty_release+0x40b/0x10d0 drivers/tty/tty_io.c:1670 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb other info that might help us debug this: Chain exists of: console_owner --> &port_lock_key --> &(&port->lock)->rlock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&(&port->lock)->rlock); lock(&port_lock_key); lock(&(&port->lock)->rlock); lock(console_owner); *** DEADLOCK *** 2 locks held by syz-executor.4/31035: #0: (&tty->legacy_mutex){+.+.}, at: [] tty_lock+0x5f/0x70 drivers/tty/tty_mutex.c:19 #1: (&(&port->lock)->rlock){-.-.}, at: [] tty_port_close_start.part.0+0x28/0x4c0 drivers/tty/tty_port.c:573 stack backtrace: CPU: 1 PID: 31035 Comm: syz-executor.4 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1905 [inline] check_prevs_add kernel/locking/lockdep.c:2022 [inline] validate_chain kernel/locking/lockdep.c:2464 [inline] __lock_acquire+0x2e0e/0x3f20 kernel/locking/lockdep.c:3491 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 console_trylock_spinning kernel/printk/printk.c:1679 [inline] vprintk_emit+0x367/0x620 kernel/printk/printk.c:1922 vprintk_func+0x58/0x152 kernel/printk/printk_safe.c:401 printk+0x9e/0xbc kernel/printk/printk.c:1996 tty_port_close_start.part.0+0x46c/0x4c0 drivers/tty/tty_port.c:575 tty_port_close_start drivers/tty/tty_port.c:647 [inline] tty_port_close+0x3b/0x130 drivers/tty/tty_port.c:640 tty_release+0x40b/0x10d0 drivers/tty/tty_io.c:1670 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x417811 RSP: 002b:00007ffeeb9620e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000417811 RDX: 0000001b2c220000 RSI: 0000000000000256 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000054bb6256 R09: 0000000054bb625a R10: 00007ffeeb9621c0 R11: 0000000000000293 R12: ffffffffffffffff R13: 00000000000e9e46 R14: 00000000000003e8 R15: 000000000119bf2c loop3: p3 start 4293001441 is beyond EOD, loop0: partition table partially beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 truncated CPU: 0 PID: 31045 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] net_alloc net/core/net_namespace.c:362 [inline] copy_net_ns+0xf7/0x440 net/core/net_namespace.c:402 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c loop3: p4 size 3657465856 extends beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated loop5: p1 p2 p3 p4 p4: loop3: p6 size 3657465856 extends beyond EOD, truncated loop5: partition table partially beyond EOD, truncated loop5: p1 start 10 is beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop5: p4 size 3657465856 extends beyond EOD, truncated truncated loop0: p1 start 10 is beyond EOD, truncated loop0: p2 start 25 is beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop5: p6 size 3657465856 extends beyond EOD, truncated loop0: p3 start 4293001441 is beyond EOD, truncated loop3: p1 p2 p3 p4 p4: loop3: partition table partially beyond EOD, truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop3: p1 start 10 is beyond EOD, loop0: p5 start 10 is beyond EOD, truncated truncated loop0: p6 size 3657465856 extends beyond EOD, truncated loop3: p2 start 25 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, truncated loop1: p3 start 4293001441 is beyond EOD, truncated loop3: p4 size 3657465856 extends beyond EOD, truncated loop1: p4 size 3657465856 extends beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated loop1: p5 start 10 is beyond EOD, truncated loop3: p6 size 3657465856 extends beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 loop5: p1 p2 p3 p4 p4: loop5: partition table partially beyond EOD, truncated CPU: 0 PID: 31113 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 loop5: p1 start 10 is beyond EOD, Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 truncated should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 loop5: p2 start 25 is beyond EOD, truncated kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] proc_net_ns_init+0x43/0x390 fs/proc/proc_net.c:195 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 loop5: p3 start 4293001441 is beyond EOD, setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 truncated unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c loop5: p4 size 3657465856 extends beyond EOD, truncated loop0: p1 p2 p3 p4 p4: loop5: p5 start 10 is beyond EOD, loop0: partition table partially beyond EOD, truncated truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop5: p6 size 3657465856 extends beyond EOD, truncated loop1: p1 p2 p3 p4 p4: loop1: partition table partially beyond EOD, truncated loop0: p1 start 10 is beyond EOD, truncated loop1: p1 start 10 is beyond EOD, truncated loop0: p2 start 25 is beyond EOD, truncated loop1: p2 start 25 is beyond EOD, truncated loop1: p3 start 4293001441 is beyond EOD, truncated loop1: p4 size 3657465856 extends beyond EOD, truncated loop1: p5 start 10 is beyond EOD, loop0: p3 start 4293001441 is beyond EOD, loop3: p1 p2 p3 p4 p4: truncated truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop3: partition table partially beyond EOD, truncated loop0: p5 start 10 is beyond EOD, truncated loop3: p1 start 10 is beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, truncated loop3: p2 start 25 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, truncated loop3: p4 size 3657465856 extends beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated loop3: p6 size 3657465856 extends beyond EOD, truncated VFS: could not find a valid V7 on loop4. loop3: p1 p2 p3 p4 p4: FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 loop3: partition table partially beyond EOD, truncated loop5: p1 p2 p3 p4 p4: loop3: p1 start 10 is beyond EOD, truncated loop3: p2 start 25 is beyond EOD, truncated loop5: partition table partially beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, truncated CPU: 0 PID: 31176 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] __proc_create+0x147/0x5e0 fs/proc/generic.c:366 proc_mkdir_data+0x8f/0x1e0 fs/proc/generic.c:419 proc_net_mkdir include/linux/proc_fs.h:79 [inline] proc_net_ns_init+0x1fa/0x390 fs/proc/proc_net.c:217 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c loop1: p1 p2 p3 p4 p4: loop1: partition table partially beyond EOD, truncated loop5: p1 start 10 is beyond EOD, VFS: could not find a valid V7 on loop4. loop3: p4 size 3657465856 extends beyond EOD, truncated truncated loop1: p1 start 10 is beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated loop3: p6 size 3657465856 extends beyond EOD, loop1: p2 start 25 is beyond EOD, loop5: p4 size 3657465856 extends beyond EOD, truncated truncated truncated loop1: p3 start 4293001441 is beyond EOD, truncated loop1: p4 size 3657465856 extends beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop5: p6 size 3657465856 extends beyond EOD, truncated loop5: p1 p2 p3 p4 p4: loop5: partition table partially beyond EOD, truncated loop1: p5 start 10 is beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop5: p1 start 10 is beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop5: p4 size 3657465856 extends beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop5: p6 size 3657465856 extends beyond EOD, truncated loop3: p1 p2 p3 p4 p4: loop3: partition table partially beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 loop3: p1 start 10 is beyond EOD, CPU: 1 PID: 31237 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 truncated Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] __proc_create+0x147/0x5e0 fs/proc/generic.c:366 proc_mkdir_data+0x8f/0x1e0 fs/proc/generic.c:419 proc_net_mkdir include/linux/proc_fs.h:79 [inline] netfilter_net_init+0x9c/0x120 net/netfilter/core.c:582 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c cannot create netfilter proc entry loop3: p2 start 25 is beyond EOD, loop0: p1 p2 p3 p4 p4: loop0: partition table partially beyond EOD, truncated loop0: p1 start 10 is beyond EOD, truncated truncated loop3: p3 start 4293001441 is beyond EOD, loop0: p2 start 25 is beyond EOD, truncated truncated loop3: p4 size 3657465856 extends beyond EOD, loop0: p3 start 4293001441 is beyond EOD, truncated truncated loop3: p5 start 10 is beyond EOD, truncated loop3: p6 size 3657465856 extends beyond EOD, truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop0: p5 start 10 is beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, truncated loop5: p1 p2 p3 p4 p4: netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop5: partition table partially beyond EOD, truncated loop1: p1 p2 p3 p4 p4: loop3: p1 p2 p3 p4 p4: loop3: partition table partially beyond EOD, truncated loop5: p1 start 10 is beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop1: partition table partially beyond EOD, truncated loop3: p1 start 10 is beyond EOD, loop5: p3 start 4293001441 is beyond EOD, truncated truncated loop1: p1 start 10 is beyond EOD, truncated loop5: p4 size 3657465856 extends beyond EOD, truncated loop1: p2 start 25 is beyond EOD, truncated loop3: p2 start 25 is beyond EOD, truncated loop1: p3 start 4293001441 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, loop1: p4 size 3657465856 extends beyond EOD, truncated loop3: p4 size 3657465856 extends beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated truncated loop5: p6 size 3657465856 extends beyond EOD, loop3: p6 size 3657465856 extends beyond EOD, truncated truncated loop1: p5 start 10 is beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop0: p1 p2 p3 p4 p4: loop0: partition table partially beyond EOD, truncated loop0: p1 start 10 is beyond EOD, truncated loop0: p2 start 25 is beyond EOD, truncated loop0: p3 start 4293001441 is beyond EOD, truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop0: p5 start 10 is beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 31308 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] __proc_create+0x147/0x5e0 fs/proc/generic.c:366 proc_mkdir_data+0x8f/0x1e0 fs/proc/generic.c:419 proc_net_mkdir include/linux/proc_fs.h:79 [inline] netfilter_net_init+0x9c/0x120 net/netfilter/core.c:582 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c cannot create netfilter proc entry loop5: p1 p2 p3 p4 p4: loop5: partition table partially beyond EOD, truncated loop1: p1 p2 p3 p4 p4: loop1: partition table partially beyond EOD, truncated loop5: p1 start 10 is beyond EOD, truncated loop1: p1 start 10 is beyond EOD, truncated loop1: p2 start 25 is beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop3: p1 p2 p3 p4 p4: loop3: partition table partially beyond EOD, truncated loop3: p1 start 10 is beyond EOD, loop1: p3 start 4293001441 is beyond EOD, loop5: p3 start 4293001441 is beyond EOD, truncated truncated truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 loop5: p4 size 3657465856 extends beyond EOD, loop1: p4 size 3657465856 extends beyond EOD, loop3: p2 start 25 is beyond EOD, truncated truncated truncated CPU: 1 PID: 31353 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 loop5: p5 start 10 is beyond EOD, slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] __proc_create+0x147/0x5e0 fs/proc/generic.c:366 loop1: p5 start 10 is beyond EOD, proc_create_data+0xb3/0x1e0 fs/proc/generic.c:488 nf_log_net_init+0x57/0x340 net/netfilter/nf_log.c:560 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 truncated do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb truncated RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c loop5: p6 size 3657465856 extends beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, loop1: p6 size 3657465856 extends beyond EOD, truncated truncated loop3: p4 size 3657465856 extends beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated loop0: p1 p2 p3 p4 p4: loop3: p6 size 3657465856 extends beyond EOD, truncated loop5: p1 p2 p3 p4 p4: loop0: partition table partially beyond EOD, truncated loop5: partition table partially beyond EOD, truncated loop0: p1 start 10 is beyond EOD, truncated loop5: p1 start 10 is beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated loop0: p2 start 25 is beyond EOD, truncated loop0: p3 start 4293001441 is beyond EOD, truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop5: p4 size 3657465856 extends beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop5: p6 size 3657465856 extends beyond EOD, truncated loop0: p5 start 10 is beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop3: p1 p2 p3 p4 p4: loop3: partition table partially beyond EOD, truncated loop5: p1 p2 p3 p4 p4: loop5: partition table partially beyond EOD, truncated loop3: p1 start 10 is beyond EOD, truncated loop1: p1 p2 p3 p4 p4: loop5: p1 start 10 is beyond EOD, truncated loop1: partition table partially beyond EOD, truncated loop3: p2 start 25 is beyond EOD, loop5: p2 start 25 is beyond EOD, truncated loop1: p1 start 10 is beyond EOD, truncated truncated loop1: p2 start 25 is beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 31440 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 loop5: p4 size 3657465856 extends beyond EOD, kmemdup+0x23/0x50 mm/util.c:118 kmemdup include/linux/string.h:445 [inline] netfilter_log_sysctl_init net/netfilter/nf_log.c:488 [inline] nf_log_net_init+0x8d/0x340 net/netfilter/nf_log.c:564 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 truncated ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c loop3: p4 size 3657465856 extends beyond EOD, loop1: p3 start 4293001441 is beyond EOD, truncated truncated loop1: p4 size 3657465856 extends beyond EOD, truncated loop1: p5 start 10 is beyond EOD, loop5: p5 start 10 is beyond EOD, truncated truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop5: p6 size 3657465856 extends beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated loop0: p1 p2 p3 p4 p4: loop3: p6 size 3657465856 extends beyond EOD, truncated loop0: partition table partially beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop0: p1 start 10 is beyond EOD, truncated loop0: p2 start 25 is beyond EOD, truncated loop0: p3 start 4293001441 is beyond EOD, truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop0: p5 start 10 is beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 31494 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] new_dir fs/proc/proc_sysctl.c:945 [inline] get_subdir fs/proc/proc_sysctl.c:990 [inline] __register_sysctl_table+0x877/0xf90 fs/proc/proc_sysctl.c:1333 netfilter_log_sysctl_init net/netfilter/nf_log.c:515 [inline] nf_log_net_init+0xe7/0x340 net/netfilter/nf_log.c:564 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c sysctl could not get directory: //net -12 CPU: 0 PID: 31494 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 loop1: p1 p2 p3 p4 p4: Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 __register_sysctl_table+0xc6b/0xf90 fs/proc/proc_sysctl.c:1352 loop1: partition table partially beyond EOD, netfilter_log_sysctl_init net/netfilter/nf_log.c:515 [inline] nf_log_net_init+0xe7/0x340 net/netfilter/nf_log.c:564 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 truncated copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 loop1: p1 start 10 is beyond EOD, SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 truncated do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 loop1: p2 start 25 is beyond EOD, entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c loop3: p1 p2 p3 p4 p4: print_req_error: I/O error, dev loop0, sector 0 loop3: partition table partially beyond EOD, truncated loop5: p1 p2 p3 p4 p4: Buffer I/O error on dev loop0, logical block 0, async page read loop5: partition table partially beyond EOD, ldm_validate_partition_table(): Disk read failed. loop3: p1 start 10 is beyond EOD, truncated Dev loop0: unable to read RDB block 0 truncated loop0: unable to read partition table loop1: p3 start 4293001441 is beyond EOD, truncated loop1: p4 size 3657465856 extends beyond EOD, truncated loop1: p5 start 10 is beyond EOD, truncated loop0: partition table beyond EOD, truncated loop3: p2 start 25 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, truncated truncated loop5: p1 start 10 is beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop3: p4 size 3657465856 extends beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated loop5: p4 size 3657465856 extends beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop3: p6 size 3657465856 extends beyond EOD, loop5: p6 size 3657465856 extends beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. truncated loop1: p1 p2 p3 p4 p4: loop0: p1 p2 p3 p4 p4: loop1: partition table partially beyond EOD, truncated loop0: partition table partially beyond EOD, truncated loop0: p1 start 10 is beyond EOD, truncated loop0: p2 start 25 is beyond EOD, truncated loop1: p1 start 10 is beyond EOD, truncated loop0: p3 start 4293001441 is beyond EOD, truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop1: p2 start 25 is beyond EOD, FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 truncated CPU: 0 PID: 31587 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 loop1: p3 start 4293001441 is beyond EOD, Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] new_dir fs/proc/proc_sysctl.c:945 [inline] get_subdir fs/proc/proc_sysctl.c:990 [inline] __register_sysctl_table+0x877/0xf90 fs/proc/proc_sysctl.c:1333 netfilter_log_sysctl_init net/netfilter/nf_log.c:515 [inline] nf_log_net_init+0xe7/0x340 net/netfilter/nf_log.c:564 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c loop5: p1 p2 p3 p4 p4: loop5: partition table partially beyond EOD, truncated loop3: p1 p2 p3 p4 p4: loop0: p5 start 10 is beyond EOD, truncated loop3: partition table partially beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, truncated truncated loop5: p1 start 10 is beyond EOD, loop3: p1 start 10 is beyond EOD, sysctl could not get directory: loop1: p4 size 3657465856 extends beyond EOD, / truncated /net -12 truncated truncated loop3: p2 start 25 is beyond EOD, truncated loop1: p5 start 10 is beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated CPU: 0 PID: 31587 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 loop5: p3 start 4293001441 is beyond EOD, Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 __register_sysctl_table+0xc6b/0xf90 fs/proc/proc_sysctl.c:1352 loop3: p4 size 3657465856 extends beyond EOD, netfilter_log_sysctl_init net/netfilter/nf_log.c:515 [inline] nf_log_net_init+0xe7/0x340 net/netfilter/nf_log.c:564 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 truncated truncated copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 loop5: p4 size 3657465856 extends beyond EOD, SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 truncated do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 loop3: p5 start 10 is beyond EOD, entry_SYSCALL_64_after_hwframe+0x46/0xbb loop5: p5 start 10 is beyond EOD, RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 truncated RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c truncated loop5: p6 size 3657465856 extends beyond EOD, truncated loop3: p6 size 3657465856 extends beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. print_req_error: I/O error, dev loop3, sector 0 Buffer I/O error on dev loop3, logical block 0, async page read ldm_validate_partition_table(): Disk read failed. Dev loop3: unable to read RDB block 0 loop3: unable to read partition table loop3: partition table beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 loop1: p1 p2 p3 p4 p4: CPU: 0 PID: 31645 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 loop1: partition table partially beyond EOD, Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 truncated kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] new_dir fs/proc/proc_sysctl.c:945 [inline] get_subdir fs/proc/proc_sysctl.c:990 [inline] __register_sysctl_table+0x877/0xf90 fs/proc/proc_sysctl.c:1333 loop1: p1 start 10 is beyond EOD, truncated netfilter_log_sysctl_init net/netfilter/nf_log.c:515 [inline] nf_log_net_init+0xe7/0x340 net/netfilter/nf_log.c:564 loop1: p2 start 25 is beyond EOD, ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 truncated loop1: p3 start 4293001441 is beyond EOD, copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 truncated loop1: p4 size 3657465856 extends beyond EOD, do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 truncated entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b loop1: p5 start 10 is beyond EOD, R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c truncated sysctl could not get directory: loop0: p1 p2 p3 p4 p4: /net/netfilter/ loop0: partition table partially beyond EOD, /nf_log -12 CPU: 0 PID: 31645 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 __register_sysctl_table+0xc6b/0xf90 fs/proc/proc_sysctl.c:1352 netfilter_log_sysctl_init net/netfilter/nf_log.c:515 [inline] nf_log_net_init+0xe7/0x340 net/netfilter/nf_log.c:564 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop0: p1 start 10 is beyond EOD, truncated loop3: p1 p2 p3 p4 p4: loop5: p1 p2 p3 p4 p4: loop3: partition table partially beyond EOD, loop0: p2 start 25 is beyond EOD, loop5: partition table partially beyond EOD, truncated loop1: p1 p2 p3 p4 p4: truncated loop1: partition table partially beyond EOD, loop0: p3 start 4293001441 is beyond EOD, truncated loop3: p1 start 10 is beyond EOD, truncated truncated truncated loop3: p2 start 25 is beyond EOD, truncated loop1: p1 start 10 is beyond EOD, loop0: p4 size 3657465856 extends beyond EOD, loop5: p1 start 10 is beyond EOD, loop3: p3 start 4293001441 is beyond EOD, truncated truncated truncated loop1: p2 start 25 is beyond EOD, truncated loop0: p5 start 10 is beyond EOD, loop5: p2 start 25 is beyond EOD, truncated loop1: p3 start 4293001441 is beyond EOD, truncated truncated truncated loop0: p6 size 3657465856 extends beyond EOD, truncated loop1: p4 size 3657465856 extends beyond EOD, loop3: p4 size 3657465856 extends beyond EOD, loop5: p3 start 4293001441 is beyond EOD, truncated truncated loop3: p5 start 10 is beyond EOD, truncated truncated loop3: p6 size 3657465856 extends beyond EOD, truncated loop5: p4 size 3657465856 extends beyond EOD, truncated loop1: p5 start 10 is beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop5: p6 size 3657465856 extends beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop0: p1 p2 p3 p4 p4: loop0: partition table partially beyond EOD, truncated loop0: p1 start 10 is beyond EOD, truncated loop1: p1 p2 p3 p4 p4: loop1: partition table partially beyond EOD, truncated loop0: p2 start 25 is beyond EOD, truncated loop0: p3 start 4293001441 is beyond EOD, truncated loop1: p1 start 10 is beyond EOD, truncated loop1: p2 start 25 is beyond EOD, truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop1: p3 start 4293001441 is beyond EOD, truncated loop5: p1 p2 p3 p4 p4: loop3: p1 p2 p3 p4 p4: loop5: partition table partially beyond EOD, loop0: p5 start 10 is beyond EOD, truncated loop1: p4 size 3657465856 extends beyond EOD, loop3: partition table partially beyond EOD, truncated truncated truncated loop0: p6 size 3657465856 extends beyond EOD, truncated loop5: p1 start 10 is beyond EOD, truncated loop3: p1 start 10 is beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop1: p5 start 10 is beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, loop3: p2 start 25 is beyond EOD, truncated loop0: p1 p2 p3 p4 p4: loop5: p4 size 3657465856 extends beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop0: partition table partially beyond EOD, truncated loop5: p6 size 3657465856 extends beyond EOD, truncated truncated loop3: p3 start 4293001441 is beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 loop0: p1 start 10 is beyond EOD, CPU: 1 PID: 31754 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 loop3: p4 size 3657465856 extends beyond EOD, Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 truncated slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] __proc_create+0x147/0x5e0 fs/proc/generic.c:366 truncated loop0: p2 start 25 is beyond EOD, proc_create_data+0xb3/0x1e0 fs/proc/generic.c:488 truncated netlink_net_init+0x45/0x70 net/netlink/af_netlink.c:2682 loop0: p3 start 4293001441 is beyond EOD, ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 loop3: p5 start 10 is beyond EOD, copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 truncated create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 truncated do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 loop3: p6 size 3657465856 extends beyond EOD, entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 loop0: p4 size 3657465856 extends beyond EOD, ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c truncated R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c truncated loop0: p5 start 10 is beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop5: p1 p2 p3 p4 p4: loop5: partition table partially beyond EOD, truncated loop5: p1 start 10 is beyond EOD, truncated loop0: p1 p2 p3 p4 p4: loop5: p2 start 25 is beyond EOD, truncated loop0: partition table partially beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated loop3: p1 p2 p3 p4 p4: loop0: p1 start 10 is beyond EOD, truncated loop3: partition table partially beyond EOD, loop1: p1 p2 p3 p4 p4: truncated loop5: p4 size 3657465856 extends beyond EOD, truncated loop0: p2 start 25 is beyond EOD, truncated loop1: partition table partially beyond EOD, truncated loop3: p1 start 10 is beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 loop3: p2 start 25 is beyond EOD, loop0: p3 start 4293001441 is beyond EOD, truncated loop5: p5 start 10 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, CPU: 1 PID: 31807 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 truncated Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 loop1: p1 start 10 is beyond EOD, should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:661 [inline] __proc_create+0x147/0x5e0 fs/proc/generic.c:366 proc_create_data+0xb3/0x1e0 fs/proc/generic.c:488 netlink_net_init+0x45/0x70 net/netlink/af_netlink.c:2682 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c truncated loop5: p6 size 3657465856 extends beyond EOD, loop3: p4 size 3657465856 extends beyond EOD, loop0: p4 size 3657465856 extends beyond EOD, truncated truncated loop3: p5 start 10 is beyond EOD, truncated truncated loop1: p2 start 25 is beyond EOD, truncated loop0: p5 start 10 is beyond EOD, truncated truncated loop1: p3 start 4293001441 is beyond EOD, truncated loop3: p6 size 3657465856 extends beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, loop1: p4 size 3657465856 extends beyond EOD, truncated truncated loop3: p1 p2 p3 p4 p4: loop1: p5 start 10 is beyond EOD, truncated loop3: partition table partially beyond EOD, truncated loop1: p6 size 3657465856 extends beyond EOD, truncated loop3: p1 start 10 is beyond EOD, truncated loop3: p2 start 25 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, truncated netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop3: p4 size 3657465856 extends beyond EOD, loop5: p1 p2 p3 p4 p4: loop5: partition table partially beyond EOD, truncated truncated loop5: p1 start 10 is beyond EOD, truncated loop3: p5 start 10 is beyond EOD, truncated loop3: p6 size 3657465856 extends beyond EOD, truncated loop5: p2 start 25 is beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated loop5: p4 size 3657465856 extends beyond EOD, truncated loop0: p1 p2 p3 p4 p4: loop0: partition table partially beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 31851 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 loop0: p1 start 10 is beyond EOD, Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] sock_alloc_inode+0x5f/0x250 net/socket.c:254 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo+0x14/0xe0 fs/inode.c:899 sock_alloc+0x3c/0x270 net/socket.c:569 sock_create_lite+0x71/0x110 net/socket.c:1086 __netlink_kernel_create+0xc2/0x7c0 net/netlink/af_netlink.c:2001 netlink_kernel_create include/linux/netlink.h:63 [inline] rtnetlink_net_init+0xa2/0x110 net/core/rtnetlink.c:4385 ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop5: p5 start 10 is beyond EOD, loop1: p1 p2 p3 p4 p4: truncated loop1: partition table partially beyond EOD, truncated truncated loop5: p6 size 3657465856 extends beyond EOD, truncated loop3: p1 p2 p3 p4 p4: loop3: partition table partially beyond EOD, truncated loop3: p1 start 10 is beyond EOD, truncated loop3: p2 start 25 is beyond EOD, truncated loop3: p3 start 4293001441 is beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 loop1: p1 start 10 is beyond EOD, truncated loop3: p4 size 3657465856 extends beyond EOD, truncated CPU: 1 PID: 31872 Comm: syz-executor.2 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 loop1: p2 start 25 is beyond EOD, Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] sock_alloc_inode+0x5f/0x250 net/socket.c:254 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo+0x14/0xe0 fs/inode.c:899 sock_alloc+0x3c/0x270 net/socket.c:569 sock_create_lite+0x71/0x110 net/socket.c:1086 __netlink_kernel_create+0xc2/0x7c0 net/netlink/af_netlink.c:2001 netlink_kernel_create include/linux/netlink.h:63 [inline] rtnetlink_net_init+0xa2/0x110 net/core/rtnetlink.c:4385 loop0: p2 start 25 is beyond EOD, ops_init+0xaa/0x3e0 net/core/net_namespace.c:118 setup_net+0x22f/0x530 net/core/net_namespace.c:295 truncated copy_net_ns+0x19b/0x440 net/core/net_namespace.c:419 create_new_namespaces+0x375/0x720 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xa1/0x1d0 kernel/nsproxy.c:206 SYSC_unshare kernel/fork.c:2412 [inline] SyS_unshare+0x308/0x7f0 kernel/fork.c:2362 truncated loop0: p3 start 4293001441 is beyond EOD, do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb truncated RIP: 0033:0x45deb9 RSP: 002b:00007f0764b5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000038340 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 00007f0764b5eca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f R13: 00007ffd8d47253f R14: 00007f0764b5f9c0 R15: 000000000119bf2c loop3: p5 start 10 is beyond EOD, loop1: p3 start 4293001441 is beyond EOD, truncated truncated loop3: p6 size 3657465856 extends beyond EOD, loop1: p4 size 3657465856 extends beyond EOD, truncated truncated loop0: p4 size 3657465856 extends beyond EOD, truncated loop5: p1 p2 p3 p4 p4: loop0: p5 start 10 is beyond EOD, truncated loop0: p6 size 3657465856 extends beyond EOD, truncated loop5: partition table partially beyond EOD, truncated loop5: p1 start 10 is beyond EOD, truncated loop0: p1 p2 p3 p4 p4: netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. loop5: p2 start 25 is beyond EOD, truncated loop0: partition table partially beyond EOD, truncated loop5: p3 start 4293001441 is beyond EOD, truncated loop0: p1 start 10 is beyond EOD, truncated