cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  199.820771] ldm_validate_privheads(): Disk read failed.
[  199.836859]  loop1: p1[EZD]
[  199.840997] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:31 executing program 2:
write(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40, 0x0)
ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f00000000c0)=0xfffffffffffffff7)
socket$inet_sctp(0x2, 0x5, 0x84)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x40300)
r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x440000)
setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88)
userfaultfd(0x800)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000200)=0x432, 0xfffffffffffffc74)
connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0xfffffec7)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='batadv0\x00', 0x10)
ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000380))
sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0)

03:25:31 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:31 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  199.868091] loop1: partition table partially beyond EOD, truncated
[  199.880341] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  199.898610] loop1: p1 start 1 is beyond EOD, truncated
[  199.909145]  loop5: p1[EZD]
03:25:32 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:32 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, 0x0, 0x0)

03:25:32 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])

03:25:32 executing program 1:
r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x9, 0x101000)
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="0f2554c77c9f4d7e68ee35b9ffab7a062f15a612d20aef63a31b28cd1b37f5399458f6b36148cde4d091a107cfd8cf43c294bb1bfbeed8fbbe89ee7ea6788f884584375802e4cbf0cb12d3dd279ee1b101586bc8d6724e684bf7e41e8429d52d3d7b36eac0f1445869480c193ac144a9036acbddb1cece987095474e88b8aed658ffc163891cc71f6d8e5f6a4b131d58b37e677f0bd7382b26c6172d53fed55f8665d9cac7eabbe3f2612ed1a92834dc53d99b8c4d3131e8f2e362412c8d3e119d9a767e47471f80774d8f2af606d293fc796a51881d30ec639d8d09a0b2ccdc56aa6f171e2bb6275f52ccec08fdab96a01f8f86a463769c72448142", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:32 executing program 2:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])

03:25:32 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, 0x0, 0x0)

[  200.125352] 9pnet: Insufficient options for proto=fd
[  200.183263] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  200.203240] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  200.222388] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:32 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, 0x0, 0x0)

[  200.226016]  loop4: p1[EZD]
[  200.241108] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  200.265030] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  200.266386] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  200.291767]  loop5: p1[EZD]
03:25:32 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:32 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)

[  200.317295]  loop1: p1[EZD]
03:25:32 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:32 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)

03:25:32 executing program 1:
r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x9, 0x101000)
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  200.420457] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  200.458354] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  200.500942]  loop2: p1[EZD]
[  200.521242] 9pnet: Insufficient options for proto=fd
[  200.553502] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  200.567584] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  200.582574] loop_reread_partitions: partition scan of loop2 () failed (rc=-16)
[  200.588838]  loop5: p1[EZD]
[  200.593968] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  200.604447] print_req_error: 79 callbacks suppressed
[  200.604453] print_req_error: I/O error, dev loop2, sector 1
[  200.608944] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  200.621879] print_req_error: I/O error, dev loop2, sector 1
[  200.627669] buffer_io_error: 10 callbacks suppressed
[  200.627676] Buffer I/O error on dev loop2p1, logical block 0, async page read
[  200.640434] print_req_error: I/O error, dev loop2, sector 2
[  200.646147] Buffer I/O error on dev loop2p1, logical block 1, async page read
[  200.646178] print_req_error: I/O error, dev loop2, sector 3
[  200.646186] Buffer I/O error on dev loop2p1, logical block 2, async page read
[  200.646203] print_req_error: I/O error, dev loop2, sector 4
[  200.646210] Buffer I/O error on dev loop2p1, logical block 3, async page read
[  200.646225] print_req_error: I/O error, dev loop2, sector 5
[  200.672619] Buffer I/O error on dev loop2p1, logical block 4, async page read
[  200.688141]  loop4: p1[EZD]
[  200.692955] print_req_error: I/O error, dev loop2, sector 6
[  200.692967] Buffer I/O error on dev loop2p1, logical block 5, async page read
[  200.692983] print_req_error: I/O error, dev loop2, sector 7
[  200.692989] Buffer I/O error on dev loop2p1, logical block 6, async page read
[  200.693010] print_req_error: I/O error, dev loop2, sector 8
[  200.701762] Buffer I/O error on dev loop2p1, logical block 7, async page read
[  200.710528] print_req_error: I/O error, dev loop2, sector 1
[  200.722107] Buffer I/O error on dev loop2p1, logical block 0, async page read
03:25:32 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:32 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)

03:25:32 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
r1 = socket$netlink(0x10, 0x3, 0xc)
writev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="d7d91f2c552ce1946b5e154b0aa6f4629c473be1870685440fada7b41813fbf498983238adecd878a85659002f027cbd9ce2a439f9a0bc2f5ebdadacaa87ad3d36b574e5576baa1465add20ad913d92e73b63485125b0cdc9e58692b754474f6b8bbff", 0x63}, {&(0x7f0000000100)="0f2877eb19f2a31cde0d901051513f25107e1ac2d5b51f9b9ccf1541a675e387e01914e17bdcdf1f3f64098fbc210308550bb8488987ddec951667650520afc88a9402549b9abea94eaef87714776142c4084045214c772d4ef9b61a92c6494fe2c8f01c83a05ab643105c5f64184172316a0ecc3f7452d4ee1b3e4830b91d4bda4f97c4a49ce1b9ece121a034abb788d979bad42547", 0x96}], 0x2)
writev(r1, &(0x7f0000000040)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
dup2(r2, r1)

[  200.722144] Buffer I/O error on dev loop2p1, logical block 1, async page read
03:25:32 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:32 executing program 2:
clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket(0x0, 0x0, 0x0)
r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0)
poll(0x0, 0xfffffffffffffde6, 0xfffffffffffffc01)
clone(0x70024100, 0x0, 0x0, 0x0, 0x0)
ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000240)={0x7, 0x8000, 0x1f})
rt_sigaction(0x32, &(0x7f0000000100)={&(0x7f0000000040)="3e660f16991f907c9b430fc200bcc481e973d00964652e470f380559ffc481fd294d0ec423c55e905f5d000000c402790eef8f29e09bd366f04783a70700000000666666430fae3d00000000", {0x7}, 0x0, &(0x7f00000000c0)="c4e31d4a7900f4c461d573db02410fae67a52666470f3a1660f801c4e1f97ffc3e2e660ffded2e65d90561726396260f1bb46c1cbaa69cc421cd60d0660fe93a"}, &(0x7f00000001c0)={&(0x7f0000000140)="0f0fa10c0000001c8a8049d0e8076fc4817dd7cc78183e47a5f30fbd7e9ec422019b0067460f6aa108000000260f38081c38", {}, 0x0, &(0x7f0000000180)="c4e165e5048067d9f3c442d5dcd6c442210795090000003ef241afc442b1abf5f2f042870ac4e22191ac35a85300000f1197930000000faeee"}, 0x8, &(0x7f0000000200))

[  200.822073] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  200.859462] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  200.874224]  loop1: p1[EZD]
03:25:32 executing program 3 (fault-call:4 fault-nth:0):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:33 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:33 executing program 1:
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  200.934731] audit: type=1400 audit(1564716332.985:55): avc:  denied  { sys_admin } for  pid=8783 comm="syz-executor.2" capability=21  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
[  200.969669] FAULT_INJECTION: forcing a failure.
[  200.969669] name failslab, interval 1, probability 0, space 0, times 1
[  201.017356] CPU: 0 PID: 8790 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  201.024424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  201.033779] Call Trace:
[  201.036358]  dump_stack+0x138/0x19c
[  201.039987]  should_fail.cold+0x10f/0x159
[  201.044143]  should_failslab+0xdb/0x130
[  201.048128]  kmem_cache_alloc_trace+0x2e9/0x790
[  201.052804]  ? lock_downgrade+0x6e0/0x6e0
[  201.056961]  sctp_association_new+0x6b/0x1e40
[  201.061463]  ? sctp_v6_scope+0x46/0x50
[  201.066825]  __sctp_connect+0x631/0xc00
[  201.070803]  ? sctp_clear_owner_w+0x120/0x120
[  201.075279]  ? __local_bh_enable_ip+0x99/0x1a0
[  201.079851]  ? trace_hardirqs_on_caller+0x400/0x590
[  201.084849]  ? __local_bh_enable_ip+0x99/0x1a0
[  201.089414]  sctp_connect+0xb8/0x100
[  201.093114]  inet_dgram_connect+0x114/0x1e0
[  201.097429]  SYSC_connect+0x1f6/0x2d0
[  201.101221]  ? SYSC_bind+0x220/0x220
[  201.104928]  ? fput+0xd4/0x150
[  201.108100]  ? SyS_write+0x15e/0x230
[  201.111807]  SyS_connect+0x24/0x30
[  201.115357]  ? SyS_accept+0x30/0x30
[  201.118967]  do_syscall_64+0x1e8/0x640
[  201.122842]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  201.127690]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  201.132885] RIP: 0033:0x459829
[  201.136062] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  201.143769] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  201.151025] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  201.158273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
03:25:33 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802)
ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, 0x0)

03:25:33 executing program 3 (fault-call:4 fault-nth:1):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  201.165630] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  201.172892] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  201.207056] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  201.236078] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  201.253849]  loop4: p1[EZD]
[  201.267493] FAULT_INJECTION: forcing a failure.
[  201.267493] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[  201.279323] CPU: 0 PID: 8808 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  201.279340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  201.279344] Call Trace:
[  201.279361]  dump_stack+0x138/0x19c
[  201.279379]  should_fail.cold+0x10f/0x159
[  201.279397]  __alloc_pages_nodemask+0x1d6/0x7a0
[  201.279411]  ? __alloc_pages_slowpath+0x2930/0x2930
[  201.279432]  cache_grow_begin+0x80/0x400
[  201.279444]  kmem_cache_alloc_trace+0x6b2/0x790
[  201.279456]  ? lock_downgrade+0x6e0/0x6e0
[  201.279470]  sctp_association_new+0x6b/0x1e40
03:25:33 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0)
r2 = userfaultfd(0x0)
getsockname$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10)
ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5)
ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080))
ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r3 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value={<r4=>0x0}, &(0x7f0000002000)=0x8)
setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x4b, &(0x7f00000003c0)={{{@in6=@rand_addr="17f71b7987c0c40ba04f931361372558", @in6=@rand_addr="2ab8e761b35d7784a37433bf665fc594"}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, 0xe8)
r5 = dup2(r1, r3)
syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x20000000000000, 0x10000)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000140)={r4, 0x7ff, 0x7, 0x5, 0x84, 0x3}, 0x14)
dup3(r5, r2, 0x0)

[  201.279481]  ? sctp_v6_scope+0x46/0x50
[  201.279491]  __sctp_connect+0x631/0xc00
[  201.279505]  ? sctp_clear_owner_w+0x120/0x120
[  201.279517]  ? __local_bh_enable_ip+0x99/0x1a0
[  201.295884]  ? trace_hardirqs_on_caller+0x400/0x590
[  201.295898]  ? __local_bh_enable_ip+0x99/0x1a0
[  201.295911]  sctp_connect+0xb8/0x100
[  201.295925]  inet_dgram_connect+0x114/0x1e0
[  201.295952]  SYSC_connect+0x1f6/0x2d0
[  201.302133]  ? SYSC_bind+0x220/0x220
[  201.302152]  ? fput+0xd4/0x150
[  201.302161]  ? SyS_write+0x15e/0x230
[  201.315977]  SyS_connect+0x24/0x30
[  201.315986]  ? SyS_accept+0x30/0x30
[  201.315999]  do_syscall_64+0x1e8/0x640
[  201.324693]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  201.324710]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  201.324717] RIP: 0033:0x459829
[  201.324724] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246
[  201.333325]  ORIG_RAX: 000000000000002a
[  201.333332] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  201.333338] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
03:25:33 executing program 3 (fault-call:4 fault-nth:2):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  201.333344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  201.333349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  201.333355] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  201.407559] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  201.481543] IPVS: ftp: loaded support on port[0] = 21
[  201.489761] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  201.505611] FAULT_INJECTION: forcing a failure.
[  201.505611] name failslab, interval 1, probability 0, space 0, times 0
[  201.517652] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  201.529445]  loop1: p1[EZD]
[  201.543702] CPU: 0 PID: 8817 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  201.550739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  201.560088] Call Trace:
[  201.562683]  dump_stack+0x138/0x19c
[  201.566323]  should_fail.cold+0x10f/0x159
[  201.570483]  should_failslab+0xdb/0x130
[  201.574464]  __kmalloc+0x2f0/0x7a0
[  201.578009]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  201.583460]  ? sctp_stream_init+0x83/0x2d0
[  201.587696]  ? rcu_read_lock_sched_held+0x110/0x130
[  201.592887]  ? sctp_stream_init+0x98/0x2d0
[  201.597128]  sctp_stream_init+0x98/0x2d0
[  201.601200]  sctp_association_new+0x10c3/0x1e40
[  201.605877]  __sctp_connect+0x631/0xc00
[  201.609860]  ? sctp_clear_owner_w+0x120/0x120
[  201.614355]  ? __local_bh_enable_ip+0x99/0x1a0
[  201.618932]  ? trace_hardirqs_on_caller+0x400/0x590
[  201.623949]  ? __local_bh_enable_ip+0x99/0x1a0
[  201.628528]  sctp_connect+0xb8/0x100
[  201.632250]  inet_dgram_connect+0x114/0x1e0
[  201.636569]  SYSC_connect+0x1f6/0x2d0
[  201.640383]  ? SYSC_bind+0x220/0x220
[  201.644099]  ? fput+0xd4/0x150
[  201.647286]  ? SyS_write+0x15e/0x230
[  201.651001]  SyS_connect+0x24/0x30
[  201.654530]  ? SyS_accept+0x30/0x30
[  201.658203]  do_syscall_64+0x1e8/0x640
[  201.662068]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  201.666983]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  201.672151] RIP: 0033:0x459829
[  201.675322] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  201.683011] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  201.690348] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  201.697595] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  201.704842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  201.712089] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:33 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:33 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:33 executing program 2:
r0 = accept4(0xffffffffffffff9c, &(0x7f0000002000)=@xdp={0x2c, 0x0, <r1=>0x0}, &(0x7f0000002080)=0x80, 0x0)
sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1)
r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001)
add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff)
ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0))
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', r1})
setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4)
r4 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)={0x5, [0x0, 0x0, 0x0, <r5=>0x0, 0x0]}, &(0x7f0000000240)=0x18)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r5, 0x1000, 0x4, [0xd63, 0x9b02, 0x81, 0x2]}, &(0x7f0000000440)=0x10)
ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000380)={@local})
syz_open_pts(0xffffffffffffffff, 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000500))
syz_open_pts(0xffffffffffffffff, 0x400001)
listen(0xffffffffffffffff, 0x0)
ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x4e22, @broadcast}})
fdatasync(r2)
ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback})
ioctl(0xffffffffffffffff, 0x1000008914, &(0x7f00000003c0)="0adc1f123c12")
r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3)
socket$nl_netfilter(0x10, 0x3, 0xc)
getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000400)=""/44, &(0x7f0000000100)=0x4)
dup2(0xffffffffffffffff, r6)

03:25:33 executing program 3 (fault-call:4 fault-nth:3):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:33 executing program 1:
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  201.763023] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  201.775279]  loop5: p1[EZD]
[  201.800439] FAULT_INJECTION: forcing a failure.
[  201.800439] name failslab, interval 1, probability 0, space 0, times 0
[  201.812217] CPU: 0 PID: 8831 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  201.819234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  201.819239] Call Trace:
[  201.819255]  dump_stack+0x138/0x19c
[  201.819273]  should_fail.cold+0x10f/0x159
[  201.838959]  should_failslab+0xdb/0x130
[  201.838973]  kmem_cache_alloc_trace+0x2e9/0x790
[  201.838985]  ? __ipv6_addr_type+0x199/0x28f
[  201.838998]  sctp_add_bind_addr+0x6d/0x360
[  201.839007]  sctp_copy_one_addr+0xf9/0x120
[  201.839018]  sctp_bind_addr_copy+0xfc/0x294
[  201.839029]  sctp_assoc_set_bind_addr_from_ep+0x13a/0x190
[  201.839038]  __sctp_connect+0x652/0xc00
[  201.839050]  ? sctp_clear_owner_w+0x120/0x120
[  201.839058]  ? __local_bh_enable_ip+0x99/0x1a0
[  201.860512]  ? trace_hardirqs_on_caller+0x400/0x590
[  201.860528]  ? __local_bh_enable_ip+0x99/0x1a0
[  201.860542]  sctp_connect+0xb8/0x100
[  201.860555]  inet_dgram_connect+0x114/0x1e0
[  201.860568]  SYSC_connect+0x1f6/0x2d0
[  201.860581]  ? SYSC_bind+0x220/0x220
[  201.870416]  ? fput+0xd4/0x150
03:25:34 executing program 3 (fault-call:4 fault-nth:4):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  201.870429]  ? SyS_write+0x15e/0x230
[  201.870446]  SyS_connect+0x24/0x30
[  201.870454]  ? SyS_accept+0x30/0x30
[  201.870467]  do_syscall_64+0x1e8/0x640
[  201.870475]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  201.870491]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  201.878919] RIP: 0033:0x459829
[  201.878925] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  201.878936] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  201.878942] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
03:25:34 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  201.878947] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  201.878955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  201.893244] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  202.075284] FAULT_INJECTION: forcing a failure.
[  202.075284] name failslab, interval 1, probability 0, space 0, times 0
[  202.090850] CPU: 1 PID: 8851 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  202.097885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  202.107227] Call Trace:
[  202.107244]  dump_stack+0x138/0x19c
[  202.113429]  should_fail.cold+0x10f/0x159
[  202.113447]  should_failslab+0xdb/0x130
03:25:34 executing program 1:
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="0f2554c77c9f4d7e68ee35b9ffab7a062f15a612d20aef63a31b28cd1b37f5399458f6b36148cde4d091a107cfd8cf43c294bb1bfbeed8fbbe89ee7ea6788f884584375802e4cbf0cb12d3dd279ee1b101586bc8d6724e684bf7e41e8429d52d3d7b36eac0f1445869480c193ac144a9036acbddb1cece987095474e88b8aed658ffc163891cc71f6d8e5f6a4b131d58b37e677f0bd7382b26c6172d53fed55f8665d9cac7eabbe3f2612ed1a92834dc53d99b8c4d3131e8f2e362412c8d3e119d9a767e47471f80774d8f2af606d293fc796a51881d30ec639d8d09a0b2ccdc56aa6f171e2bb6275f52ccec08fdab96a01f8f86a463769c72448142", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  202.113460]  kmem_cache_alloc_trace+0x2e9/0x790
[  202.113473]  ? __ipv6_addr_type+0x199/0x28f
[  202.130529]  sctp_add_bind_addr+0x6d/0x360
[  202.134777]  sctp_copy_one_addr+0xf9/0x120
[  202.139021]  sctp_bind_addr_copy+0xfc/0x294
[  202.143343]  sctp_assoc_set_bind_addr_from_ep+0x13a/0x190
[  202.148883]  __sctp_connect+0x652/0xc00
[  202.152864]  ? sctp_clear_owner_w+0x120/0x120
[  202.157359]  ? __local_bh_enable_ip+0x99/0x1a0
[  202.161939]  ? trace_hardirqs_on_caller+0x400/0x590
[  202.161954]  ? __local_bh_enable_ip+0x99/0x1a0
[  202.161967]  sctp_connect+0xb8/0x100
[  202.161979]  inet_dgram_connect+0x114/0x1e0
[  202.161990]  SYSC_connect+0x1f6/0x2d0
[  202.162001]  ? SYSC_bind+0x220/0x220
[  202.162020]  ? fput+0xd4/0x150
[  202.162031]  ? SyS_write+0x15e/0x230
[  202.175399]  SyS_connect+0x24/0x30
[  202.175409]  ? SyS_accept+0x30/0x30
[  202.175423]  do_syscall_64+0x1e8/0x640
[  202.175432]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  202.175447]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  202.201250] RIP: 0033:0x459829
[  202.201257] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  202.201270] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  202.201276] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  202.201282] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  202.201288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  202.201294] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  202.220394] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  202.279104] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  202.300135]  loop4: p1[EZD]
03:25:34 executing program 3 (fault-call:4 fault-nth:5):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:34 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:34 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x9, 0x101000)
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="0f2554c77c9f4d7e68ee35b9ffab7a062f15a612d20aef63a31b28cd1b37f5399458f6b36148cde4d091a107cfd8cf43c294bb1bfbeed8fbbe89ee7ea6788f884584375802e4cbf0cb12d3dd279ee1b101586bc8d6724e684bf7e41e8429d52d3d7b36eac0f1445869480c193ac144a9036acbddb1cece987095474e88b8aed658ffc163891cc71f6d8e5f6a4b131d58b37e677f0bd7382b26c6172d53fed55f8665d9cac7eabbe3f2612ed1a92834dc53d99b8c4d3131e8f2e362412c8d3e119d9a767e47471f80774d8f2af606d293fc796a51881d30ec639d8d09a0b2ccdc56aa6f171e2bb6275f52ccec08fdab96a01f8f86a463769c72448142", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  202.440561] FAULT_INJECTION: forcing a failure.
[  202.440561] name failslab, interval 1, probability 0, space 0, times 0
[  202.493272] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  202.517654] CPU: 1 PID: 8875 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  202.524713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  202.524720] Call Trace:
[  202.524737]  dump_stack+0x138/0x19c
[  202.524758]  should_fail.cold+0x10f/0x159
[  202.543153] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  202.544448]  should_failslab+0xdb/0x130
[  202.544462]  kmem_cache_alloc_trace+0x2e9/0x790
[  202.544477]  ? sctp_copy_one_addr+0x5a/0x120
[  202.557224]  loop5: p1[EZD]
[  202.558979]  sctp_transport_new+0x65/0x880
[  202.558992]  sctp_assoc_add_peer+0x1f8/0xfd0
[  202.559007]  __sctp_connect+0x200/0xc00
[  202.566331]  ? sctp_clear_owner_w+0x120/0x120
[  202.566344]  ? __local_bh_enable_ip+0x99/0x1a0
[  202.566357]  ? trace_hardirqs_on_caller+0x400/0x590
[  202.566366]  ? __local_bh_enable_ip+0x99/0x1a0
[  202.566375]  sctp_connect+0xb8/0x100
[  202.566385]  inet_dgram_connect+0x114/0x1e0
[  202.566394]  SYSC_connect+0x1f6/0x2d0
[  202.566402]  ? SYSC_bind+0x220/0x220
[  202.566415]  ? fput+0xd4/0x150
[  202.566422]  ? SyS_write+0x15e/0x230
[  202.566432]  SyS_connect+0x24/0x30
[  202.566438]  ? SyS_accept+0x30/0x30
[  202.566447]  do_syscall_64+0x1e8/0x640
[  202.579120]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  202.579140]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
03:25:34 executing program 2:
perf_event_open(&(0x7f0000000040)={0x0, 0x26, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xc, 0x0, 0x0, 0x1800000, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x542}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0xffffffff, 0x400000)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet6(0xa, 0x400000000001, 0x0)
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000540))
ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000800))
bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r3 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xffffffff, 0x2)
ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000000))
r4 = dup2(r2, r2)
setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000140)={@loopback, @loopback}, 0x8)
ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000100))
sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x28042, 0x0)
getpeername$inet(r4, &(0x7f00000003c0)={0x2, 0x0, @multicast1}, &(0x7f0000000400)=0x10)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0)
r5 = socket$netlink(0x10, 0x3, 0x0)
setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000000c0)={0x3f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x0, 'lblcr\x00', 0x1, 0x7, 0x50}, 0x2c)
connect$inet(r5, 0x0, 0x0)
r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4)
ftruncate(r6, 0x80003)

[  202.579149] RIP: 0033:0x459829
[  202.593188] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  202.593201] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  202.593207] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  202.593213] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  202.593219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  202.593225] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  202.718281] 9pnet: Insufficient options for proto=fd
[  202.741244] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  202.779210] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:34 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:34 executing program 3 (fault-call:4 fault-nth:6):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  202.802868]  loop4: p1[EZD]
[  202.820962] IPVS: set_ctl: invalid protocol: 63 172.30.0.3:20000
[  202.840946] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  202.869810] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  202.885772] IPVS: set_ctl: invalid protocol: 63 172.30.0.3:20000
[  202.901044]  loop1: p1[EZD]
[  202.907342] FAULT_INJECTION: forcing a failure.
[  202.907342] name failslab, interval 1, probability 0, space 0, times 0
[  202.946187] CPU: 0 PID: 8909 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  202.953248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  202.962598] Call Trace:
[  202.962616]  dump_stack+0x138/0x19c
[  202.962634]  should_fail.cold+0x10f/0x159
[  202.962648]  should_failslab+0xdb/0x130
[  202.968848]  kmem_cache_alloc_node_trace+0x5a/0x770
[  202.968864]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  202.968879]  __kmalloc_node_track_caller+0x3d/0x80
[  202.968893]  __kmalloc_reserve.isra.0+0x40/0xe0
[  202.981985]  __alloc_skb+0xcf/0x500
[  202.981998]  ? skb_scrub_packet+0x4b0/0x4b0
[  202.982012]  ? sctp_bind_addrs_to_raw+0x200/0x320
[  202.982026]  _sctp_make_chunk+0x51/0x270
[  202.997048]  ? ipv6_dev_get_saddr+0x33f/0x9b0
[  202.997070]  sctp_make_control+0x35/0x150
[  202.997082]  sctp_make_init+0x5e9/0xad0
[  203.005013]  ? sctp_init_cause+0xd0/0xd0
[  203.005029]  ? __lock_acquire+0x5f7/0x4620
[  203.005040]  ? __lock_acquire+0x5f7/0x4620
[  203.005051]  ? trace_hardirqs_on+0x10/0x10
[  203.013936]  ? xfrm_policy_lookup+0x70/0x70
[  203.013949]  ? sctp_sm_lookup_event+0xf7/0x34a
[  203.013964]  sctp_sf_do_prm_asoc+0xc2/0x350
[  203.013976]  sctp_do_sm+0xfb/0x4ae0
[  203.013988]  ? save_trace+0x290/0x290
[  203.063758]  ? save_trace+0x290/0x290
[  203.069085]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  203.075041]  ? find_held_lock+0x35/0x130
[  203.079088]  ? sctp_hash_transport+0xbec/0x1510
[  203.083779]  ? lock_downgrade+0x6e0/0x6e0
[  203.091236]  ? sctp_hash_transport+0xee/0x1510
[  203.096585]  ? sctp_transport_hashtable_destroy+0x20/0x20
[  203.102106]  ? memcpy+0x46/0x50
[  203.105384]  ? sctp_assoc_set_primary+0x236/0x2d0
[  203.110212]  sctp_primitive_ASSOCIATE+0x9d/0xd0
[  203.114865]  __sctp_connect+0x785/0xc00
[  203.118826]  ? sctp_clear_owner_w+0x120/0x120
[  203.123302]  ? __local_bh_enable_ip+0x99/0x1a0
[  203.127868]  ? trace_hardirqs_on_caller+0x400/0x590
[  203.132871]  ? __local_bh_enable_ip+0x99/0x1a0
[  203.137450]  sctp_connect+0xb8/0x100
[  203.141149]  inet_dgram_connect+0x114/0x1e0
[  203.145456]  SYSC_connect+0x1f6/0x2d0
[  203.149241]  ? SYSC_bind+0x220/0x220
[  203.152945]  ? fput+0xd4/0x150
[  203.156123]  ? SyS_write+0x15e/0x230
[  203.159830]  SyS_connect+0x24/0x30
[  203.163354]  ? SyS_accept+0x30/0x30
[  203.166965]  do_syscall_64+0x1e8/0x640
[  203.170833]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  203.175665]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  203.180849] RIP: 0033:0x459829
[  203.184023] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
03:25:35 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
keyctl$set_timeout(0xf, 0x0, 0x0)
write$P9_RLINK(0xffffffffffffffff, 0x0, 0xffffffffffffff5c)
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, r0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = syz_open_dev$midi(0x0, 0x7, 0x8001)
ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x3, r1})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
epoll_create1(0x80000)

03:25:35 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:35 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  203.191719] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  203.198981] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  203.206234] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  203.213484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  203.220732] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:35 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:35 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x101000)
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:35 executing program 3 (fault-call:4 fault-nth:7):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:35 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  203.456098] 9pnet: Insufficient options for proto=fd
[  203.487087] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  203.503949] FAULT_INJECTION: forcing a failure.
[  203.503949] name failslab, interval 1, probability 0, space 0, times 0
[  203.508905] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  203.559294] CPU: 1 PID: 8935 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  203.566366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  203.575721] Call Trace:
[  203.575740]  dump_stack+0x138/0x19c
[  203.575772]  should_fail.cold+0x10f/0x159
[  203.581974]  should_failslab+0xdb/0x130
[  203.581988]  kmem_cache_alloc+0x47/0x780
[  203.581999]  ? __alloc_skb+0x3ee/0x500
[  203.582011]  ? skb_scrub_packet+0x4b0/0x4b0
[  203.582026]  sctp_chunkify+0x4b/0x280
03:25:35 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  203.582036]  _sctp_make_chunk+0x14d/0x270
[  203.582046]  ? ipv6_dev_get_saddr+0x33f/0x9b0
[  203.582057]  sctp_make_control+0x35/0x150
[  203.586272]  loop4: p1[EZD]
[  203.590152]  sctp_make_init+0x5e9/0xad0
[  203.590170]  ? sctp_init_cause+0xd0/0xd0
[  203.590182]  ? __lock_acquire+0x5f7/0x4620
[  203.590191]  ? __lock_acquire+0x5f7/0x4620
[  203.590201]  ? trace_hardirqs_on+0x10/0x10
[  203.590212]  ? xfrm_policy_lookup+0x70/0x70
[  203.590222]  ? sctp_sm_lookup_event+0xf7/0x34a
[  203.590234]  sctp_sf_do_prm_asoc+0xc2/0x350
[  203.590245]  sctp_do_sm+0xfb/0x4ae0
[  203.606277]  ? save_trace+0x290/0x290
[  203.606287]  ? save_trace+0x290/0x290
[  203.606305]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  203.619045]  ? find_held_lock+0x35/0x130
[  203.619059]  ? sctp_hash_transport+0xbec/0x1510
[  203.619075]  ? lock_downgrade+0x6e0/0x6e0
[  203.625950]  ? sctp_hash_transport+0xee/0x1510
[  203.625964]  ? sctp_transport_hashtable_destroy+0x20/0x20
[  203.625977]  ? memcpy+0x46/0x50
[  203.642685]  ? sctp_assoc_set_primary+0x236/0x2d0
[  203.642702]  sctp_primitive_ASSOCIATE+0x9d/0xd0
[  203.642713]  __sctp_connect+0x785/0xc00
[  203.651684]  ? sctp_clear_owner_w+0x120/0x120
[  203.651695]  ? retint_kernel+0x2d/0x2d
[  203.651709]  ? sctp_connect+0x6a/0x100
[  203.651717]  sctp_connect+0xb8/0x100
[  203.651729]  inet_dgram_connect+0x114/0x1e0
[  203.651741]  SYSC_connect+0x1f6/0x2d0
[  203.651750]  ? SYSC_bind+0x220/0x220
[  203.651772]  ? fput+0xd4/0x150
[  203.743525]  ? SyS_write+0x15e/0x230
[  203.747235]  SyS_connect+0x24/0x30
[  203.750760]  ? SyS_accept+0x30/0x30
[  203.754369]  do_syscall_64+0x1e8/0x640
[  203.758265]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  203.763180]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  203.768349] RIP: 0033:0x459829
[  203.771519] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  203.779210] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  203.786460] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  203.793710] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  203.800960] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  203.808215] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  203.841351] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  203.863653] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  203.876107] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  203.877618] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  203.893446]  loop1: p1[EZD]
03:25:36 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:36 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:36 executing program 3 (fault-call:4 fault-nth:8):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  203.950999]  loop5: p1[EZD]
[  204.045462] FAULT_INJECTION: forcing a failure.
[  204.045462] name failslab, interval 1, probability 0, space 0, times 0
[  204.131682] CPU: 0 PID: 8967 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  204.138748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  204.148101] Call Trace:
[  204.150697]  dump_stack+0x138/0x19c
[  204.154332]  should_fail.cold+0x10f/0x159
[  204.158485]  should_failslab+0xdb/0x130
[  204.162464]  kmem_cache_alloc_node+0x287/0x780
[  204.167059]  __alloc_skb+0x9c/0x500
[  204.170690]  ? skb_scrub_packet+0x4b0/0x4b0
[  204.175008]  ? ip6_mtu+0x287/0x410
[  204.178554]  sctp_packet_transmit+0x351/0x3020
[  204.183135]  ? sctp_packet_config+0x614/0x9f0
[  204.187639]  ? __sctp_packet_append_chunk+0x39d/0xb40
[  204.192829]  ? sctp_packet_config+0x9f0/0x9f0
[  204.192841]  ? sctp_packet_append_chunk+0x4f0/0xaf0
[  204.192856]  sctp_outq_flush+0x841/0x31b0
[  204.202591]  ? find_held_lock+0x35/0x130
[  204.202605]  ? perf_trace_itimer_state+0x363/0x640
[  204.202624]  ? __sctp_outq_teardown+0xde0/0xde0
[  204.202632]  ? trace_hardirqs_on_caller+0x400/0x590
[  204.202644]  ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[  204.202663]  sctp_outq_uncork+0x60/0x70
[  204.235299]  sctp_do_sm+0x417/0x4ae0
[  204.238998]  ? save_trace+0x290/0x290
[  204.242784]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  204.248734]  ? find_held_lock+0x35/0x130
[  204.252783]  ? sctp_hash_transport+0xbec/0x1510
[  204.257437]  ? lock_downgrade+0x6e0/0x6e0
[  204.261568]  ? sctp_hash_transport+0xee/0x1510
[  204.266136]  ? memcpy+0x46/0x50
[  204.269395]  ? sctp_assoc_set_primary+0x236/0x2d0
[  204.274329]  sctp_primitive_ASSOCIATE+0x9d/0xd0
[  204.279433]  __sctp_connect+0x785/0xc00
[  204.283396]  ? sctp_clear_owner_w+0x120/0x120
[  204.287871]  ? __local_bh_enable_ip+0x99/0x1a0
[  204.292433]  ? trace_hardirqs_on_caller+0x400/0x590
[  204.297434]  ? __local_bh_enable_ip+0x99/0x1a0
[  204.302002]  sctp_connect+0xb8/0x100
[  204.305698]  inet_dgram_connect+0x114/0x1e0
[  204.310004]  SYSC_connect+0x1f6/0x2d0
[  204.313789]  ? SYSC_bind+0x220/0x220
[  204.317491]  ? fput+0xd4/0x150
[  204.320667]  ? SyS_write+0x15e/0x230
[  204.324365]  SyS_connect+0x24/0x30
[  204.327881]  ? SyS_accept+0x30/0x30
[  204.331487]  do_syscall_64+0x1e8/0x640
[  204.335348]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  204.340176]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  204.345343] RIP: 0033:0x459829
[  204.348513] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  204.356200] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  204.363452] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  204.370705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  204.377956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  204.385204] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:36 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  204.481306] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  204.506463] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  204.544814]  loop4: p1[EZD]
[  204.568274] loop4: p1 size 2047 extends beyond EOD, truncated
[  204.641368] loop_reread_partitions: partition scan of loop4 () failed (rc=-16)
[  204.734835] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  204.758159] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  204.773761]  loop5: p1[EZD]
03:25:36 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
keyctl$set_timeout(0xf, 0x0, 0x0)
write$P9_RLINK(0xffffffffffffffff, 0x0, 0xffffffffffffff5c)
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, r0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = syz_open_dev$midi(0x0, 0x7, 0x8001)
ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x3, r1})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
epoll_create1(0x80000)

03:25:36 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:36 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:36 executing program 3 (fault-call:4 fault-nth:9):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:36 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:36 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:37 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  204.887304] FAULT_INJECTION: forcing a failure.
[  204.887304] name failslab, interval 1, probability 0, space 0, times 0
[  204.911106] 9pnet: Insufficient options for proto=fd
[  204.975129] CPU: 1 PID: 9000 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  204.982191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  204.991547] Call Trace:
[  204.994144]  dump_stack+0x138/0x19c
[  204.997779]  should_fail.cold+0x10f/0x159
[  205.001936]  should_failslab+0xdb/0x130
[  205.005920]  kmem_cache_alloc_node+0x287/0x780
[  205.010518]  __alloc_skb+0x9c/0x500
[  205.014147]  ? skb_scrub_packet+0x4b0/0x4b0
[  205.018472]  ? ip6_mtu+0x287/0x410
[  205.022017]  sctp_packet_transmit+0x351/0x3020
[  205.026601]  ? sctp_packet_config+0x614/0x9f0
[  205.031110]  ? __sctp_packet_append_chunk+0x39d/0xb40
[  205.036303]  ? sctp_packet_config+0x9f0/0x9f0
[  205.040799]  ? sctp_packet_append_chunk+0x4f0/0xaf0
[  205.045819]  sctp_outq_flush+0x841/0x31b0
[  205.049971]  ? find_held_lock+0x35/0x130
[  205.054030]  ? perf_trace_itimer_state+0x363/0x640
[  205.058973]  ? __sctp_outq_teardown+0xde0/0xde0
[  205.063636]  ? trace_hardirqs_on_caller+0x400/0x590
[  205.069301]  ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[  205.069328]  sctp_outq_uncork+0x60/0x70
[  205.086367]  sctp_do_sm+0x417/0x4ae0
[  205.090082]  ? save_trace+0x290/0x290
[  205.093883]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  205.093892]  ? find_held_lock+0x35/0x130
[  205.093902]  ? sctp_hash_transport+0xbec/0x1510
[  205.093917]  ? lock_downgrade+0x6e0/0x6e0
[  205.103922]  ? sctp_hash_transport+0xee/0x1510
[  205.103942]  ? memcpy+0x46/0x50
[  205.103953]  ? sctp_assoc_set_primary+0x236/0x2d0
[  205.112730]  sctp_primitive_ASSOCIATE+0x9d/0xd0
[  205.130037]  __sctp_connect+0x785/0xc00
[  205.134012]  ? sctp_clear_owner_w+0x120/0x120
[  205.138510]  ? __local_bh_enable_ip+0x99/0x1a0
[  205.143098]  ? trace_hardirqs_on_caller+0x400/0x590
[  205.148116]  ? __local_bh_enable_ip+0x99/0x1a0
[  205.152697]  sctp_connect+0xb8/0x100
[  205.156450]  inet_dgram_connect+0x114/0x1e0
[  205.160772]  SYSC_connect+0x1f6/0x2d0
[  205.164573]  ? SYSC_bind+0x220/0x220
[  205.168301]  ? fput+0xd4/0x150
[  205.171499]  ? SyS_write+0x15e/0x230
[  205.175215]  SyS_connect+0x24/0x30
[  205.178749]  ? SyS_accept+0x30/0x30
[  205.182380]  do_syscall_64+0x1e8/0x640
[  205.186267]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  205.191117]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  205.196301] RIP: 0033:0x459829
[  205.199486] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  205.207196] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  205.214462] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  205.221738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  205.229005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  205.236776] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  205.252217] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  205.263580] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:37 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  205.291577] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  205.303325] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  205.340193]  loop5: p1[EZD]
[  205.344572]  loop4: p1[EZD]
[  205.360990] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:37 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  205.387581] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  205.407107] loop4: p1 size 2047 extends beyond EOD, truncated
[  205.413223]  loop1: p1[EZD]
03:25:37 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:37 executing program 3 (fault-call:4 fault-nth:10):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:37 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="0f2554c77c9f4d7e68ee35b9ffab7a062f15a612d20aef63a31b28cd1b37f5399458f6b36148cde4d091a107cfd8cf43c294bb1bfbeed8fbbe89ee7ea6788f884584375802e4cbf0cb12d3dd279ee1b101586bc8d6724e684bf7e41e8429d52d3d7b36eac0f1445869480c193ac144a9036acbddb1cece987095474e88b8aed658ffc163891cc71f6d8e5f6a4b131d58b37e677f0bd7382b26c6172d53fed55f8665d9cac7eabbe3f2612ed1a92834dc53d99b8c4d3131e8f2e362412c8d3e119d9a767e47471f80774d8f2af606d293fc796a51881d30ec639d8d09a0b2ccdc56aa6f171e2bb6275f52ccec08fdab96a01f8f86a463769c72448142", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  205.572067] 9pnet: Insufficient options for proto=fd
[  205.575461] FAULT_INJECTION: forcing a failure.
[  205.575461] name failslab, interval 1, probability 0, space 0, times 0
[  205.646237] CPU: 1 PID: 9046 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  205.653287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  205.662642] Call Trace:
[  205.665231]  dump_stack+0x138/0x19c
[  205.668863]  should_fail.cold+0x10f/0x159
[  205.673021]  should_failslab+0xdb/0x130
[  205.677000]  kmem_cache_alloc_trace+0x4b/0x790
[  205.681578]  ? sctp_packet_append_chunk+0x4f0/0xaf0
[  205.686591]  ? sctp_verify_init+0x3f8/0x12c0
[  205.691000]  sctp_association_new+0x6b/0x1e40
[  205.695496]  ? sctp_v6_scope+0x46/0x50
[  205.699379]  sctp_make_temp_asoc+0x9a/0x1d0
[  205.703697]  sctp_sf_do_unexpected_init.isra.0+0x5a2/0x1180
[  205.709406]  ? sctp_sf_violation_chunk.isra.0+0x140/0x140
[  205.714939]  ? sctp_sm_lookup_event+0xf7/0x34a
[  205.719524]  sctp_sf_do_5_2_1_siminit+0x35/0x40
[  205.724199]  sctp_do_sm+0xfb/0x4ae0
[  205.727825]  ? trace_hardirqs_on+0x10/0x10
[  205.732058]  ? prepare_to_wait_exclusive+0x113/0x340
[  205.737152]  ? save_trace+0x290/0x290
[  205.737168]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  205.737179]  ? trace_hardirqs_on+0x10/0x10
[  205.751148]  ? finish_wait+0x18c/0x260
[  205.755031]  ? save_trace+0x290/0x290
[  205.758821]  ? mark_held_locks+0xb1/0x100
[  205.758832]  ? sctp_assoc_bh_rcv+0x259/0x5d0
[  205.758841]  ? find_held_lock+0x35/0x130
[  205.758851]  ? sctp_assoc_bh_rcv+0x259/0x5d0
[  205.775825]  ? kvm_clock_read+0x23/0x40
[  205.779792]  ? kvm_clock_get_cycles+0x9/0x10
[  205.784199]  ? ktime_get+0x1ba/0x2c0
[  205.787928]  sctp_assoc_bh_rcv+0x2a0/0x5d0
[  205.792170]  sctp_inq_push+0x1c9/0x260
[  205.796056]  sctp_backlog_rcv+0x116/0x860
[  205.800203]  ? trace_hardirqs_on+0xd/0x10
[  205.804352]  __release_sock+0x12d/0x350
[  205.808334]  release_sock+0x59/0x1b0
[  205.812047]  sctp_connect+0xc8/0x100
[  205.815758]  inet_dgram_connect+0x114/0x1e0
[  205.820076]  SYSC_connect+0x1f6/0x2d0
[  205.823869]  ? SYSC_bind+0x220/0x220
[  205.827587]  ? fput+0xd4/0x150
[  205.830779]  ? SyS_write+0x15e/0x230
[  205.834494]  SyS_connect+0x24/0x30
[  205.838027]  ? SyS_accept+0x30/0x30
[  205.841654]  do_syscall_64+0x1e8/0x640
[  205.845536]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  205.850377]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  205.855555] RIP: 0033:0x459829
[  205.858745] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  205.866451] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  205.873718] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  205.880981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  205.888246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  205.895513] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  205.930748] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  205.957919] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:38 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:38 executing program 2:
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2, 0x0)
r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00')
sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0xd0, r1, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x80, @dev={0xfe, 0x80, [], 0x19}}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x36}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x21a7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd52}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffe00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x80}, 0x80)
r2 = socket$alg(0x26, 0x5, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
bind$alg(r2, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58)
setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0x29, @multicast2, 0x4e21, 0x4, 'rr\x00', 0x12, 0x37b1, 0x2a}, 0x2c)
mq_unlink(&(0x7f0000000140)='rr\x00')
setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b05", 0x10)
r4 = accept$alg(r2, 0x0, 0x0)
write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa)
recvmmsg(r4, &(0x7f0000008a00)=[{{0x0, 0xfffffffffffffd17, &(0x7f0000000100)=[{&(0x7f0000000000)=""/48, 0x7510}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x1, 0x41, &(0x7f0000008bc0))

03:25:38 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  205.978666]  loop1: p1[EZD]
[  205.980755] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  205.991450] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  206.016623]  loop5: p1[EZD]
03:25:38 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  206.057863] IPVS: set_ctl: invalid protocol: 41 224.0.0.2:20001
03:25:38 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:38 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:38 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:38 executing program 3 (fault-call:4 fault-nth:11):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  206.228734] 9pnet: Insufficient options for proto=fd
03:25:38 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  206.290792] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  206.310225] FAULT_INJECTION: forcing a failure.
[  206.310225] name failslab, interval 1, probability 0, space 0, times 0
[  206.328531] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  206.360853]  loop4: p1[EZD]
[  206.376048] loop4: p1 size 2047 extends beyond EOD, truncated
[  206.385842] CPU: 1 PID: 9094 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  206.390499] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  206.392878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  206.392883] Call Trace:
[  206.392900]  dump_stack+0x138/0x19c
[  206.392918]  should_fail.cold+0x10f/0x159
[  206.392933]  should_failslab+0xdb/0x130
[  206.392946]  __kmalloc+0x71/0x7a0
[  206.415983] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  206.417735]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  206.417749]  ? sctp_stream_init+0x83/0x2d0
[  206.417761]  ? rcu_read_lock_sched_held+0x110/0x130
[  206.417770]  ? sctp_stream_init+0x98/0x2d0
[  206.417781]  sctp_stream_init+0x98/0x2d0
[  206.417794]  sctp_association_new+0x10c3/0x1e40
[  206.428741]  loop5: p1[EZD]
[  206.429330]  sctp_make_temp_asoc+0x9a/0x1d0
[  206.444848]  sctp_sf_do_unexpected_init.isra.0+0x5a2/0x1180
[  206.444863]  ? sctp_sf_violation_chunk.isra.0+0x140/0x140
[  206.444874]  ? sctp_sm_lookup_event+0xf7/0x34a
[  206.444887]  sctp_sf_do_5_2_1_siminit+0x35/0x40
[  206.444898]  sctp_do_sm+0xfb/0x4ae0
[  206.454118]  ? trace_hardirqs_on+0x10/0x10
[  206.470035]  ? prepare_to_wait_exclusive+0x113/0x340
[  206.470065]  ? save_trace+0x290/0x290
[  206.470084]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  206.470096]  ? trace_hardirqs_on+0x10/0x10
[  206.470104]  ? finish_wait+0x18c/0x260
[  206.470114]  ? save_trace+0x290/0x290
[  206.470125]  ? mark_held_locks+0xb1/0x100
[  206.470135]  ? sctp_assoc_bh_rcv+0x259/0x5d0
[  206.485912]  ? find_held_lock+0x35/0x130
[  206.485925]  ? sctp_assoc_bh_rcv+0x259/0x5d0
[  206.485950]  ? kvm_clock_read+0x23/0x40
[  206.485959]  ? kvm_clock_get_cycles+0x9/0x10
[  206.485970]  ? ktime_get+0x1ba/0x2c0
[  206.503527]  sctp_assoc_bh_rcv+0x2a0/0x5d0
03:25:38 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  206.503548]  sctp_inq_push+0x1c9/0x260
[  206.503562]  sctp_backlog_rcv+0x116/0x860
[  206.503572]  ? trace_hardirqs_on+0xd/0x10
[  206.503588]  __release_sock+0x12d/0x350
[  206.503604]  release_sock+0x59/0x1b0
[  206.503614]  sctp_connect+0xc8/0x100
[  206.503627]  inet_dgram_connect+0x114/0x1e0
[  206.517580]  SYSC_connect+0x1f6/0x2d0
[  206.517591]  ? SYSC_bind+0x220/0x220
[  206.517611]  ? fput+0xd4/0x150
[  206.517621]  ? SyS_write+0x15e/0x230
[  206.517635]  SyS_connect+0x24/0x30
[  206.529410]  ? SyS_accept+0x30/0x30
[  206.529424]  do_syscall_64+0x1e8/0x640
[  206.529433]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  206.529450]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  206.529460] RIP: 0033:0x459829
[  206.542277] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  206.542289] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  206.542295] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  206.542301] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
03:25:38 executing program 3 (fault-call:4 fault-nth:12):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:38 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  206.542307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  206.542313] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:38 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  206.721945] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  206.770356] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  206.791639]  loop1: p1[EZD]
[  206.808589] FAULT_INJECTION: forcing a failure.
[  206.808589] name failslab, interval 1, probability 0, space 0, times 0
[  206.844606] CPU: 0 PID: 9116 Comm: syz-executor.3 Not tainted 4.14.135 #31
[  206.851659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  206.860999] Call Trace:
[  206.863573]  dump_stack+0x138/0x19c
[  206.867187]  should_fail.cold+0x10f/0x159
[  206.871319]  should_failslab+0xdb/0x130
[  206.875365]  __kmalloc+0x71/0x7a0
[  206.878800]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  206.884232]  ? sctp_stream_init+0x83/0x2d0
[  206.888451]  ? rcu_read_lock_sched_held+0x110/0x130
[  206.893444]  ? sctp_stream_init+0x98/0x2d0
[  206.897657]  sctp_stream_init+0x98/0x2d0
[  206.901701]  sctp_association_new+0x10c3/0x1e40
[  206.906463]  sctp_make_temp_asoc+0x9a/0x1d0
[  206.910766]  sctp_sf_do_unexpected_init.isra.0+0x5a2/0x1180
[  206.916460]  ? sctp_sf_violation_chunk.isra.0+0x140/0x140
[  206.921977]  ? sctp_sm_lookup_event+0xf7/0x34a
[  206.926549]  sctp_sf_do_5_2_1_siminit+0x35/0x40
[  206.931202]  sctp_do_sm+0xfb/0x4ae0
[  206.934807]  ? trace_hardirqs_on+0x10/0x10
[  206.939023]  ? prepare_to_wait_exclusive+0x113/0x340
[  206.944126]  ? save_trace+0x290/0x290
[  206.947908]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  206.953858]  ? trace_hardirqs_on+0x10/0x10
[  206.958076]  ? finish_wait+0x18c/0x260
[  206.961943]  ? save_trace+0x290/0x290
[  206.965723]  ? mark_held_locks+0xb1/0x100
[  206.969853]  ? sctp_assoc_bh_rcv+0x259/0x5d0
[  206.974242]  ? find_held_lock+0x35/0x130
[  206.978282]  ? sctp_assoc_bh_rcv+0x259/0x5d0
[  206.982677]  ? kvm_clock_read+0x23/0x40
[  206.986630]  ? kvm_clock_get_cycles+0x9/0x10
[  206.991033]  ? ktime_get+0x1ba/0x2c0
[  206.994731]  sctp_assoc_bh_rcv+0x2a0/0x5d0
[  206.998954]  sctp_inq_push+0x1c9/0x260
[  207.002906]  sctp_backlog_rcv+0x116/0x860
[  207.007036]  ? trace_hardirqs_on+0xd/0x10
[  207.011171]  __release_sock+0x12d/0x350
[  207.015130]  release_sock+0x59/0x1b0
[  207.018827]  sctp_connect+0xc8/0x100
[  207.022526]  inet_dgram_connect+0x114/0x1e0
[  207.026829]  SYSC_connect+0x1f6/0x2d0
[  207.030608]  ? SYSC_bind+0x220/0x220
[  207.034305]  ? fput+0xd4/0x150
[  207.037481]  ? SyS_write+0x15e/0x230
[  207.041185]  SyS_connect+0x24/0x30
[  207.044703]  ? SyS_accept+0x30/0x30
[  207.048312]  do_syscall_64+0x1e8/0x640
[  207.052177]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  207.057002]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  207.062185] RIP: 0033:0x459829
[  207.066840] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  207.074531] RAX: ffffffffffffffda RBX: 00007f560fa3ec90 RCX: 0000000000459829
[  207.081882] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  207.089134] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  207.096381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  207.103631] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  207.131504] IPVS: set_ctl: invalid protocol: 41 224.0.0.2:20001
03:25:39 executing program 2:
socket$inet_tcp(0x2, 0x1, 0x0)
perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x61)
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00')
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1'])
r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0/f.le.\x00')
readv(r0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/9, 0x9}], 0x1)
renameat(r0, &(0x7f0000000180)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00')

03:25:39 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:39 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, &(0x7f0000000240)='./file0\x00', 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:39 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, 0x0, 0x0)

[  207.230750] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  207.276900] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  207.300553]  loop5: p1[EZD]
[  207.313179] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  207.324376] 9pnet: Insufficient options for proto=fd
03:25:39 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, 0x0, 0x0)

03:25:39 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  207.358628] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  207.405006]  loop4: p1[EZD]
03:25:39 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, 0x0, 0x0)

[  207.429813] loop4: p1 size 2047 extends beyond EOD, truncated
[  207.456912] audit: type=1400 audit(1564716339.505:56): avc:  denied  { associate } for  pid=9133 comm="syz-executor.2" name="f.le." scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
[  207.494065] overlayfs: filesystem on './file0' not supported as upperdir
[  207.511022] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:39 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x32, 0xffffffffffffffff, 0x0)
r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x0, 0x0)
r2 = accept$netrom(r1, &(0x7f0000000280)={{0x3, @default}, [@bcast, @null, @null, @netrom, @default, @netrom, @bcast, @null]}, &(0x7f0000000100)=0x48)
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x404480, 0x0)
ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f00000001c0))
setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000140)=0x4f, 0x4)
ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000))

03:25:39 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)

[  207.540150] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  207.573611]  loop1: p1[EZD]
03:25:39 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x80)
setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x100, 0x4)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:39 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:39 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)

03:25:39 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:39 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(r0, 0x0, 0x0, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x5, 0x4000000000000020)
tkill(r0, 0x200038)
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x3, 0x0, 0x1f})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)
r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00')
sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x82000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000)

03:25:39 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)

03:25:39 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x5, @ipv4={[], [], @loopback}, 0x8001}, {0xa, 0x4e21, 0xffffffffffffff90, @ipv4={[], [], @broadcast}}, 0x2, [0x0, 0x9, 0x100000001, 0x7fff, 0x3, 0x6, 0x7]}, 0x5c)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x2)
setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000003c0)={0x9, {{0x2, 0x4e21, @loopback}}}, 0x88)

03:25:39 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0)
sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x0)
setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000680)=0xff, 0x8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0), 0xfffffffffffffffd)
ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140))
sendmsg$key(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x120}}, 0x20000000)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
prctl$PR_SET_UNALIGN(0x6, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='limits\x00')
r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
mq_timedsend(r4, &(0x7f00000001c0)="dc7b6c1098e6cab9ba9a1c421e0855e358d61c543b8587379f1da054ff233f92baaba0f887146d580959b36e1869affeb640b6a41d1bd254606b8fa5a1e42886f888dc416ea914dcf4e5c10f770f4eb3a54b5830667136a62aec86951472d03b7f25d3275c2d8049b2751d5f9c20657c93acbe7cac6fe59959523be4bb4e9dc27a929cf00a9f5822dba244b57d47", 0x8e, 0x100000001, &(0x7f00000000c0))
openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x20000, 0x0)
lstat(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00')
setsockopt$CAIFSO_LINK_SELECT(r4, 0x116, 0x7f, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1)
ioprio_set$uid(0x0, 0x0, 0x6be)
getsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000100), &(0x7f0000000280)=0x4)
ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000400)={r3, r3, 0x106a1f50, 0xd1, &(0x7f00000008c0)="00a4858f40ce254d349edb1acfe5ed80efb86bd22a4c45b49ed63d0a30ba201e5cff33c0a8c48b2b294eff1b0edfc2f2ecc1fe01a6ec6e264820b88eb532a3a86b9c7f08e58607322fb24b99d6828e886af9973c19ebf9ec0a546d770c12e2e1f016df0181e7167e4e7947344d4fcce9449e33f95dad0db9148b78234c060ff4ac5b0297e5ad6a1c405c8702aa905c2b9f1175b83dc61e00e3a3a5d89b027297c17d9841d7e457229a2e0d4ba2163907bdfcd9019cbcd9f368e78d0b3130cbf3b174f145c632365b40992764d30b4e33bf", 0x9, 0x3f, 0xffffffffffffffe1, 0x20, 0x7ff, 0x2, 0xb4, 'syz0\x00'})
ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @bcast, r5})
getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580))
ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f00000006c0)=0x1)
write$sndseq(r0, &(0x7f00000005c0)=[{0x2, 0xffffffff80000001, 0x0, 0x5, @tick=0x3, {0xfffffffffffffeff, 0x3}, {0x7b4, 0x10000}, @raw8={"67c73b31b15da66052c24840"}}, {0x0, 0x0, 0x80000001, 0x2, @time={0x77359400}, {0x80000000, 0x6895}, {0x0, 0x7}, @raw8={"0d132ea97bca1d5ace560776"}}, {0x100000001, 0x9, 0xffffffffffff5664, 0x5, @time, {0xce5a, 0x9}, {0xfff, 0x8}, @raw32={[0x100, 0x8, 0x7c]}}, {0x7, 0x80000000, 0x0, 0x3, @time={0x77359400}, {0xb95, 0xb12}, {0xffffffff00000000}, @note={0x0, 0x9, 0xfff, 0x8001, 0x4}}], 0xc0)
setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000180)=0x3, 0x4)
preadv(r3, &(0x7f00000017c0), 0x199, 0x0)

[  207.872822] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  207.908627] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  207.971364]  loop5: p1[EZD]
[  207.990722] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:40 executing program 5:
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:40 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)

03:25:40 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0xa00, 0x0)
ioctl$NBD_CLEAR_QUE(r1, 0xab05)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  208.027641] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:40 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'teql0\x00', 0x4000})
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:40 executing program 0 (fault-call:3 fault-nth:0):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  208.072293]  loop4: p1[EZD]
[  208.081547] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  208.109660] loop4: p1 size 2047 extends beyond EOD, truncated
[  208.202595] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  208.230507] FAULT_INJECTION: forcing a failure.
[  208.230507] name failslab, interval 1, probability 0, space 0, times 0
03:25:40 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  208.253105]  loop1: p1[EZD]
[  208.317475] CPU: 0 PID: 9233 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  208.324546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  208.333910] Call Trace:
[  208.336509]  dump_stack+0x138/0x19c
[  208.340148]  should_fail.cold+0x10f/0x159
[  208.344301]  should_failslab+0xdb/0x130
[  208.348285]  kmem_cache_alloc_trace+0x2e9/0x790
[  208.352964]  ? lock_downgrade+0x6e0/0x6e0
[  208.357116]  sctp_association_new+0x6b/0x1e40
[  208.361623]  ? sctp_v6_scope+0x46/0x50
[  208.365529]  __sctp_connect+0x631/0xc00
[  208.369521]  ? sctp_clear_owner_w+0x120/0x120
[  208.374022]  ? __local_bh_enable_ip+0x99/0x1a0
[  208.378619]  ? trace_hardirqs_on_caller+0x400/0x590
[  208.383648]  ? __local_bh_enable_ip+0x99/0x1a0
[  208.388241]  sctp_connect+0xb8/0x100
[  208.392047]  inet_dgram_connect+0x114/0x1e0
[  208.396370]  SYSC_connect+0x1f6/0x2d0
[  208.400174]  ? SYSC_bind+0x220/0x220
[  208.403902]  ? fput+0xd4/0x150
[  208.407097]  ? SyS_write+0x15e/0x230
[  208.410815]  SyS_connect+0x24/0x30
[  208.414352]  ? SyS_accept+0x30/0x30
[  208.417982]  do_syscall_64+0x1e8/0x640
[  208.421872]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  208.426723]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  208.432023] RIP: 0033:0x459829
[  208.435207] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  208.442921] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
[  208.450190] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  208.457462] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
03:25:40 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
prctl$PR_SET_ENDIAN(0x14, 0x1)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = semget$private(0x0, 0x3, 0x30)
semop(r1, &(0x7f0000000180)=[{0x0, 0x8, 0x800}, {0x7, 0x5, 0x800}, {0x3, 0x3, 0x800}], 0x3)
r2 = dup3(r0, r0, 0x80000)
ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000040)={0x2})
r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0)
ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000200)={0x3, 0x2, 0x654, 0x2, 0x0, 0xfffffffffefffff7, 0xfffd})
setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  208.464738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  208.472007] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:40 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x4963, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="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", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  208.580769] ldm_validate_privheads(): Disk read failed.
[  208.581203] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  208.586335]  loop5: p1[EZD]
[  208.609449] loop5: partition table partially beyond EOD, truncated
[  208.616966] loop5: p1 start 1 is beyond EOD, truncated
03:25:40 executing program 0 (fault-call:3 fault-nth:1):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:40 executing program 5:
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  208.637019] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:40 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0xfffffffffffffffe, 0x26}]}, 0x2d8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  208.716202]  loop4: p1[EZD]
[  208.730711] FAULT_INJECTION: forcing a failure.
[  208.730711] name failslab, interval 1, probability 0, space 0, times 0
[  208.752471] loop4: p1 size 2047 extends beyond EOD, truncated
[  208.827924] CPU: 0 PID: 9269 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  208.835006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  208.844385] Call Trace:
[  208.846992]  dump_stack+0x138/0x19c
[  208.850643]  should_fail.cold+0x10f/0x159
[  208.850661]  should_failslab+0xdb/0x130
[  208.850674]  __kmalloc+0x2f0/0x7a0
[  208.850689]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  208.858798]  ? sctp_stream_init+0x83/0x2d0
[  208.858812]  ? rcu_read_lock_sched_held+0x110/0x130
[  208.858820]  ? sctp_stream_init+0x98/0x2d0
[  208.858833]  sctp_stream_init+0x98/0x2d0
[  208.885303]  sctp_association_new+0x10c3/0x1e40
[  208.889983]  __sctp_connect+0x631/0xc00
[  208.893971]  ? sctp_clear_owner_w+0x120/0x120
[  208.898471]  ? __local_bh_enable_ip+0x99/0x1a0
[  208.903052]  ? trace_hardirqs_on_caller+0x400/0x590
[  208.908074]  ? __local_bh_enable_ip+0x99/0x1a0
[  208.912661]  sctp_connect+0xb8/0x100
[  208.916382]  inet_dgram_connect+0x114/0x1e0
[  208.920705]  SYSC_connect+0x1f6/0x2d0
[  208.924483]  ? SYSC_bind+0x220/0x220
[  208.928186]  ? fput+0xd4/0x150
[  208.931362]  ? SyS_write+0x15e/0x230
[  208.935076]  SyS_connect+0x24/0x30
[  208.938595]  ? SyS_accept+0x30/0x30
[  208.942202]  do_syscall_64+0x1e8/0x640
[  208.946071]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  208.950899]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  208.956065] RIP: 0033:0x459829
[  208.959245] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  208.966931] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
03:25:41 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0xc0)
ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040))
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r2 = fcntl$dupfd(r0, 0x406, r0)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000340)={{0x2, 0x0, 0x0, 0x80000001, '\x00', 0x7f}, 0x1, [0xfffffffffffff7ae, 0x7fff, 0x1, 0x6, 0x9000000000, 0x3ff, 0xff, 0x100000001, 0x7fffffff, 0x5, 0x5, 0x9, 0x7fff, 0x2, 0x400, 0x3f, 0x100000, 0x2, 0x4, 0x4, 0x4, 0x0, 0x5, 0x3f, 0xe5, 0x9, 0x6, 0x101, 0xff, 0x8000, 0x8, 0x7, 0x401, 0x20, 0x2, 0x3f, 0x1, 0x8001, 0x8, 0x9, 0xe12, 0x8, 0x5, 0x0, 0x7f, 0x1, 0xfffffffffffffff7, 0x3, 0x20, 0x7, 0x80000001, 0x1000, 0x2a2, 0x3, 0x101, 0x2, 0x8000, 0x1, 0x8, 0x5122, 0x800, 0x5, 0x9, 0x3, 0x0, 0x2, 0x3, 0x5, 0x100000000, 0x1000, 0x4, 0x1, 0xfffffffffffffffa, 0x401, 0xeb, 0x8, 0xc5, 0x1ff, 0x4, 0x1000, 0x1f, 0x9, 0xfffffffffffffffb, 0x0, 0x0, 0x8, 0x401, 0x6311228, 0x9, 0x1, 0x1, 0x2, 0x5, 0x4, 0x7, 0x10000, 0x10000, 0x1, 0xfff, 0x15, 0x800, 0x6, 0x7, 0x9, 0x4, 0x6, 0x7, 0x3ff, 0xffffffff, 0x4, 0x44, 0x5, 0x4, 0x20000, 0x1, 0x0, 0x200, 0x0, 0x1000, 0x6, 0x2, 0x8, 0x0, 0xaa, 0x1, 0x9, 0x5, 0x8], {0x77359400}})
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x80000000, @loopback}, 0x1c)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0xffffffffffffff29, 0xfa00, {0x4, &(0x7f00000002c0)={<r3=>0xffffffffffffffff}, 0x113, 0x3}}, 0x20)
ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000180)=""/89)
write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r3}}, 0xc)
ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x0, 0x7ff, 0x58, 0x1}, {0x4, 0x0, 0xdb, 0x7}]})

03:25:41 executing program 2:
r0 = socket$inet_tcp(0x2, 0x3, 0x6)
connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10)
r1 = dup(r0)
setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x28}, 0x1ff}, @in6={0xa, 0x4e23, 0x8, @remote}, @in={0x2, 0x4e20, @local}], 0x58)
r2 = fcntl$dupfd(r0, 0x0, r0)
write$selinux_attr(r2, &(0x7f0000000580)='system_u:object_r:fixed_disk_device_t:s0\xfe', 0x9990)

[  208.974179] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  208.981429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  208.988686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  208.995938] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  209.021381] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  209.033095] ldm_validate_privheads(): Disk read failed.
[  209.038601]  loop5: p1[EZD]
[  209.038611] loop5: partition table partially beyond EOD, truncated
[  209.053013] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  209.066163] loop5: p1 start 1 is beyond EOD, truncated
03:25:41 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f00000000c0)=""/227, &(0x7f0000000000)=0xe3)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f00000001c0)={0x9, [0xea, 0x7, 0x2, 0x7d9, 0xfffffffffffffffc, 0xf3, 0x200, 0x4, 0x40]})
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  209.094478]  loop1: p1[EZD]
03:25:41 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000900)="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", 0x116, r0)
r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40300, 0x0)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={<r3=>0x0})
ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000100)={r3, 0x2})
r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000640)="4090ff07afb4ced385d3b23d15e5b0", 0xf, r0)
write$FUSE_GETXATTR(r2, &(0x7f0000000240)={0x18, 0xfffffffffffffff5, 0x5, {0x3}}, 0x18)
keyctl$dh_compute(0x17, &(0x7f0000000000)={r4, r1, r4}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)})
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0x0, 0x8}, 0xfffffe7b)
sysfs$2(0x2, 0x401, 0x0)

03:25:41 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:41 executing program 0 (fault-call:3 fault-nth:2):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:41 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f0000000480)="0f2554c77c9f4d7e68ee35b9ffab7a062f15a612d20aef63a31b28cd1b37f5399458f6b36148cde4d091a107cfd8cf43c294bb1bfbeed8fbbe89ee7ea6788f884584375802e4cbf0cb12d3dd279ee1b101586bc8d6724e684bf7e41e8429d52d3d7b36eac0f1445869480c193ac144a9036acbddb1cece987095474e88b8aed658ffc163891cc71f6d8e5f6a4b131d58b37e677f0bd7382b26c6172d53fed55f8665d9cac7eabbe3f2612ed1a92834dc53d99b8c4d3131e8f2e362412c8d3e119d9a767e47471f80774d8f2af606d293fc796a51881d30ec639d8d09a0b2ccdc56aa6f171e2bb6275f52ccec08fdab96a01f8f86a463769c72448142", 0xfc, 0x4}, {&(0x7f0000000280)="48be97000e7aa15173a7c193a7935107ca208d3321b1355f880ca1271f349a3857c1803bcaf3103b5e489ffeb6574bc5dc6fc5557df6d9c968b799d8527e5cbbe24ba2ca7303ac9cb3c255f468f3bf5912d9d13c9a70ec712cca5e004c339e9d7c13ec7b45c0af62a69538e7c4c857c9f66c971b156417bf11e590f2f70995a622b706281beff65289cc389a7a09a4ab8ac8a81916ac0d00de", 0x99, 0x3ff}], 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:41 executing program 5:
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:41 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2)
ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f00000000c0))
write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="3a00000006000000000000000000000003000000000000000300000000000000110000000000000076628af4b0061b7c8f6f786e657431636772"], 0x3a)

[  209.244800] FAULT_INJECTION: forcing a failure.
[  209.244800] name failslab, interval 1, probability 0, space 0, times 0
03:25:41 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
dup2(r0, r0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20000, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0xd, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800}, @in6={0xa, 0x4e24, 0xc0f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in={0x2, 0xfffffffffffffff8, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0xbd08)

[  209.354801] CPU: 0 PID: 9310 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  209.361861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  209.361866] Call Trace:
[  209.361883]  dump_stack+0x138/0x19c
[  209.361902]  should_fail.cold+0x10f/0x159
[  209.361918]  should_failslab+0xdb/0x130
[  209.385585]  __kmalloc+0x2f0/0x7a0
[  209.389119]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  209.389132]  ? sctp_stream_init+0x83/0x2d0
[  209.389143]  ? rcu_read_lock_sched_held+0x110/0x130
[  209.389152]  ? sctp_stream_init+0x98/0x2d0
[  209.389165]  sctp_stream_init+0x98/0x2d0
[  209.389179]  sctp_association_new+0x10c3/0x1e40
[  209.416770]  __sctp_connect+0x631/0xc00
[  209.420760]  ? sctp_clear_owner_w+0x120/0x120
[  209.425255]  ? __local_bh_enable_ip+0x99/0x1a0
[  209.425270]  ? trace_hardirqs_on_caller+0x400/0x590
[  209.425282]  ? __local_bh_enable_ip+0x99/0x1a0
[  209.425297]  sctp_connect+0xb8/0x100
[  209.425310]  inet_dgram_connect+0x114/0x1e0
[  209.425321]  SYSC_connect+0x1f6/0x2d0
[  209.434896]  ? SYSC_bind+0x220/0x220
[  209.434916]  ? fput+0xd4/0x150
[  209.434928]  ? SyS_write+0x15e/0x230
[  209.434942]  SyS_connect+0x24/0x30
[  209.434950]  ? SyS_accept+0x30/0x30
[  209.461894]  do_syscall_64+0x1e8/0x640
[  209.461906]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  209.461924]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  209.461933] RIP: 0033:0x459829
[  209.461938] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  209.461948] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
[  209.461953] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  209.461958] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  209.461963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  209.461970] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:41 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
socket$tipc(0x1e, 0x7, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000000))
inotify_init1(0x80800)

[  209.581070] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  209.591227] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  209.601151] ldm_validate_privheads(): Disk read failed.
[  209.610255]  loop5: p1[EZD]
[  209.619424] loop5: partition table partially beyond EOD, truncated
03:25:41 executing program 0 (fault-call:3 fault-nth:3):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:41 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000300)={0x0, 0x0})
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
getpeername(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80)

[  209.627477] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  209.633607] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  209.654117]  loop1: p1[EZD]
[  209.657278]  loop4: p1[EZD]
[  209.666529] loop5: p1 start 1 is beyond EOD, truncated
[  209.675936] loop4: p1 size 2047 extends beyond EOD, truncated
03:25:41 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x200)
ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  209.726298] FAULT_INJECTION: forcing a failure.
[  209.726298] name failslab, interval 1, probability 0, space 0, times 0
03:25:41 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:41 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:41 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:41 executing program 2:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x31, 0x0, &(0x7f0000000140))
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x802, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7, 0x6, 0x6, 0x8000}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x40000)

[  209.851527] CPU: 1 PID: 9348 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  209.858591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  209.867950] Call Trace:
[  209.870551]  dump_stack+0x138/0x19c
[  209.874193]  should_fail.cold+0x10f/0x159
[  209.878355]  should_failslab+0xdb/0x130
[  209.882343]  kmem_cache_alloc_trace+0x2e9/0x790
[  209.887024]  ? __ipv6_addr_type+0x199/0x28f
[  209.891390]  sctp_add_bind_addr+0x6d/0x360
[  209.895632]  sctp_copy_one_addr+0xf9/0x120
[  209.899858]  sctp_bind_addr_copy+0xfc/0x294
[  209.904164]  sctp_assoc_set_bind_addr_from_ep+0x13a/0x190
[  209.909686]  __sctp_connect+0x652/0xc00
[  209.913649]  ? sctp_clear_owner_w+0x120/0x120
[  209.918129]  ? __local_bh_enable_ip+0x99/0x1a0
[  209.922693]  ? trace_hardirqs_on_caller+0x400/0x590
[  209.927693]  ? __local_bh_enable_ip+0x99/0x1a0
[  209.932267]  sctp_connect+0xb8/0x100
[  209.935964]  inet_dgram_connect+0x114/0x1e0
[  209.940269]  SYSC_connect+0x1f6/0x2d0
[  209.944053]  ? SYSC_bind+0x220/0x220
[  209.947756]  ? fput+0xd4/0x150
[  209.950928]  ? SyS_write+0x15e/0x230
[  209.954626]  SyS_connect+0x24/0x30
[  209.958169]  ? SyS_accept+0x30/0x30
[  209.961782]  do_syscall_64+0x1e8/0x640
[  209.965652]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  209.970482]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  209.975657] RIP: 0033:0x459829
[  209.978830] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  209.986520] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
[  209.993770] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  210.001021] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  210.008277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  210.015539] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:42 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=<r1=>0x0, @ANYBLOB], &(0x7f0000000040)=0xa)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e21, 0x1, @mcast1, 0x74}}}, &(0x7f0000000180)=0x84)

03:25:42 executing program 2:
r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x9, 0x2000)
socket$rds(0x15, 0x5, 0x0)
r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20001, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000200))
setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0xffffff62)

03:25:42 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0)
r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x8, [0x0, 0x0, <r2=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x24)
getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180)={r2, 0x62, "cdb90e5bdd33b3b4891dec824ef5c23c93d6378d4e8e5221a24a58b1e17cb0071e79b0b49c3feab7672377560a6d8924b85f812a4b8d5a2a10a1775a7c97c8c55124c58f66db4c67aa7362589e166431884536ae63e5fa4f309f7003eb3753bf354e"}, &(0x7f0000000200)=0x6a)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:42 executing program 0 (fault-call:3 fault-nth:4):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:42 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00)
write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[], 0x2f5)
write$cgroup_int(r2, &(0x7f0000000200), 0x43400)

[  210.191102] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  210.200696] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  210.210971] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  210.226798] FAULT_INJECTION: forcing a failure.
[  210.226798] name failslab, interval 1, probability 0, space 0, times 0
[  210.237325] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  210.247397] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  210.256495] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  210.267258] CPU: 1 PID: 9392 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  210.274301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  210.283661] Call Trace:
[  210.284979]  loop5: p1[EZD]
[  210.286257]  dump_stack+0x138/0x19c
[  210.286281]  should_fail.cold+0x10f/0x159
[  210.289281]  loop1: p1[EZD]
[  210.292827]  should_failslab+0xdb/0x130
[  210.292842]  kmem_cache_alloc_trace+0x2e9/0x790
[  210.292856]  ? __ipv6_addr_type+0x199/0x28f
[  210.292872]  sctp_add_bind_addr+0x6d/0x360
[  210.292887]  sctp_copy_one_addr+0xf9/0x120
[  210.292901]  sctp_bind_addr_copy+0xfc/0x294
[  210.308586]  sctp_assoc_set_bind_addr_from_ep+0x13a/0x190
[  210.308601]  __sctp_connect+0x652/0xc00
[  210.313044]  loop4: p1[EZD]
03:25:42 executing program 3:
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, <r0=>0xffffffffffffffff})
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{0x9, 0x28}, {0x1ff, 0x5}, 0x7, 0x3, 0x6})
flock(r0, 0x1)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r2, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
munlockall()
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000180))

[  210.317143]  ? sctp_clear_owner_w+0x120/0x120
[  210.317155]  ? __local_bh_enable_ip+0x99/0x1a0
[  210.317168]  ? trace_hardirqs_on_caller+0x400/0x590
[  210.331213]  ? __local_bh_enable_ip+0x99/0x1a0
[  210.331226]  sctp_connect+0xb8/0x100
[  210.331238]  inet_dgram_connect+0x114/0x1e0
[  210.331249]  SYSC_connect+0x1f6/0x2d0
[  210.331258]  ? SYSC_bind+0x220/0x220
[  210.331274]  ? fput+0xd4/0x150
[  210.338148]  ? SyS_write+0x15e/0x230
[  210.338165]  SyS_connect+0x24/0x30
[  210.338174]  ? SyS_accept+0x30/0x30
[  210.347220]  do_syscall_64+0x1e8/0x640
[  210.356778]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  210.356796]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  210.356806] RIP: 0033:0x459829
[  210.368596] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  210.368608] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
[  210.368614] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  210.368620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  210.368625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
03:25:42 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@initdev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8)
ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@ipv4={[], [], @multicast1}, 0x64, r1})
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x7f, 0x200000)
setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000200)="4f468caeec280ec7b5d39914d604627e54d473ec70c74660", 0x18)
ioctl$TIOCSCTTY(r2, 0x540e, 0xd17)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  210.368632] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  210.449393] loop4: p1 size 2047 extends beyond EOD, truncated
03:25:42 executing program 0 (fault-call:3 fault-nth:5):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:42 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:42 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:42 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070")
syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="716e6f000000616c6c6f632c002646913937c0f19adf3b18d6c926d1da268f7317aaaf37903afce56f105be30b582bc0ed34d68f9306aae3835709f5443426c5d2901914df6a0768d71cdf61fb853beafdbf414b2abd0a1b22adf28f2364284544f97bfc30"])

03:25:42 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840))
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:42 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
rt_sigprocmask(0x1, &(0x7f0000000000)={0x4}, &(0x7f0000000040), 0x8)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=<r1=>0x0)
mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x840, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xfffffffffffffffc}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x3e9a5c31}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x1}}], [{@obj_type={'obj_type', 0x3d, 'selinux'}}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_lt={'euid<', r1}}]})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  210.577902] FAULT_INJECTION: forcing a failure.
[  210.577902] name failslab, interval 1, probability 0, space 0, times 0
[  210.625270] CPU: 0 PID: 9412 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  210.632338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  210.632344] Call Trace:
[  210.632362]  dump_stack+0x138/0x19c
[  210.632381]  should_fail.cold+0x10f/0x159
[  210.632391]  ? find_held_lock+0x35/0x130
[  210.632405]  should_failslab+0xdb/0x130
[  210.632418]  kmem_cache_alloc_node+0x56/0x780
[  210.632434]  ? find_held_lock+0x35/0x130
[  210.632453]  __alloc_skb+0x9c/0x500
[  210.632467]  ? skb_scrub_packet+0x4b0/0x4b0
[  210.652283]  ? sctp_bind_addrs_to_raw+0x200/0x320
[  210.652296]  _sctp_make_chunk+0x51/0x270
[  210.685681]  ? ipv6_dev_get_saddr+0x33f/0x9b0
[  210.690184]  sctp_make_control+0x35/0x150
[  210.694320]  sctp_make_init+0x5e9/0xad0
[  210.698381]  ? sctp_init_cause+0xd0/0xd0
[  210.702431]  ? __lock_acquire+0x5f7/0x4620
[  210.706648]  ? __lock_acquire+0x5f7/0x4620
[  210.710866]  ? trace_hardirqs_on+0x10/0x10
[  210.715084]  ? xfrm_policy_lookup+0x70/0x70
[  210.719388]  ? sctp_sm_lookup_event+0xf7/0x34a
[  210.723954]  sctp_sf_do_prm_asoc+0xc2/0x350
[  210.728257]  sctp_do_sm+0xfb/0x4ae0
[  210.731875]  ? save_trace+0x290/0x290
[  210.735654]  ? save_trace+0x290/0x290
[  210.739445]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  210.745495]  ? find_held_lock+0x35/0x130
[  210.749541]  ? sctp_hash_transport+0xbec/0x1510
[  210.754196]  ? lock_downgrade+0x6e0/0x6e0
[  210.758330]  ? sctp_hash_transport+0xee/0x1510
[  210.762895]  ? sctp_transport_hashtable_destroy+0x20/0x20
[  210.768444]  ? memcpy+0x46/0x50
[  210.771705]  ? sctp_assoc_set_primary+0x236/0x2d0
[  210.776531]  sctp_primitive_ASSOCIATE+0x9d/0xd0
[  210.781183]  __sctp_connect+0x785/0xc00
[  210.785146]  ? sctp_clear_owner_w+0x120/0x120
[  210.789626]  ? __local_bh_enable_ip+0x99/0x1a0
[  210.794191]  ? trace_hardirqs_on_caller+0x400/0x590
[  210.799190]  ? __local_bh_enable_ip+0x99/0x1a0
[  210.803779]  sctp_connect+0xb8/0x100
[  210.807479]  inet_dgram_connect+0x114/0x1e0
[  210.811783]  SYSC_connect+0x1f6/0x2d0
[  210.815563]  ? SYSC_bind+0x220/0x220
[  210.819265]  ? fput+0xd4/0x150
[  210.822441]  ? SyS_write+0x15e/0x230
[  210.826152]  SyS_connect+0x24/0x30
[  210.829671]  ? SyS_accept+0x30/0x30
[  210.833283]  do_syscall_64+0x1e8/0x640
[  210.837171]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  210.842000]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  210.847173] RIP: 0033:0x459829
[  210.850344] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  210.858050] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
[  210.865301] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  210.872551] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  210.879802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  210.887051] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:42 executing program 0 (fault-call:3 fault-nth:6):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:43 executing program 3:
r0 = socket(0x10, 0x3, 0x0)
write(r0, &(0x7f0000000040)="26000000130047f10701c1b00ef900000700000000ffffdf09ef18ffff0809b58ac51cfbfa35", 0x26)
mmap(&(0x7f0000f95000/0x1000)=nil, 0x1000, 0x1, 0x31, 0xffffffffffffffff, 0x0)
recvmsg(r0, &(0x7f0000f95fd7)={0x0, 0xf, 0x0, 0xfffffffffffffeba}, 0x0)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r1, 0x4000000000)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
ioctl$RTC_UIE_OFF(r2, 0x7004)
epoll_create(0x80)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x4200, 0x0)
getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x2)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r4 = socket$inet_dccp(0x2, 0x6, 0x0)
rt_sigpending(&(0x7f0000000140), 0x8)
ioctl$VHOST_SET_VRING_NUM(r4, 0x4008af10, &(0x7f0000000040)={0x3, 0x9})

[  210.924539] XFS (loop2): unknown mount option [qno].
[  210.984733] XFS (loop2): unknown mount option [qno].
[  211.001202] ldm_validate_privheads(): Disk read failed.
[  211.008751] PF_BRIDGE: RTM_SETLINK with unknown ifindex
[  211.009424]  loop5: p1[EZD]
[  211.018591] ldm_validate_privheads(): Disk read failed.
[  211.025057]  loop4: p1[EZD]
03:25:43 executing program 2:
r0 = open(&(0x7f0000000100)='./file0\x00', 0x40, 0xa0)
bind$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x3f, {0xfffffffffffffff9, 0x8, 0x3ff, 0x2, 0x2, 0x5246}, 0xfffffffffffffffb, 0x6}, 0xe)
r1 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x0, 0x0)
ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000000)={0x1, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}})

[  211.032104] loop4: partition table partially beyond EOD, truncated
[  211.041729] FAULT_INJECTION: forcing a failure.
[  211.041729] name failslab, interval 1, probability 0, space 0, times 0
[  211.053184] loop5: partition table partially beyond EOD, truncated
[  211.058651] PF_BRIDGE: RTM_SETLINK with unknown ifindex
[  211.067045] CPU: 1 PID: 9447 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  211.074064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  211.074069] Call Trace:
[  211.074086]  dump_stack+0x138/0x19c
[  211.074105]  should_fail.cold+0x10f/0x159
[  211.074119]  should_failslab+0xdb/0x130
[  211.074133]  kmem_cache_alloc_node_trace+0x5a/0x770
[  211.074145]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  211.074158]  __kmalloc_node_track_caller+0x3d/0x80
[  211.074172]  __kmalloc_reserve.isra.0+0x40/0xe0
[  211.074183]  __alloc_skb+0xcf/0x500
[  211.074193]  ? skb_scrub_packet+0x4b0/0x4b0
[  211.074204]  ? sctp_bind_addrs_to_raw+0x200/0x320
[  211.074216]  _sctp_make_chunk+0x51/0x270
[  211.074228]  ? ipv6_dev_get_saddr+0x33f/0x9b0
[  211.139225]  sctp_make_control+0x35/0x150
[  211.143361]  sctp_make_init+0x5e9/0xad0
[  211.147325]  ? sctp_init_cause+0xd0/0xd0
[  211.151370]  ? __lock_acquire+0x5f7/0x4620
[  211.155585]  ? __lock_acquire+0x5f7/0x4620
[  211.159803]  ? trace_hardirqs_on+0x10/0x10
[  211.164022]  ? xfrm_policy_lookup+0x70/0x70
[  211.168326]  ? sctp_sm_lookup_event+0xf7/0x34a
[  211.172895]  sctp_sf_do_prm_asoc+0xc2/0x350
[  211.177202]  sctp_do_sm+0xfb/0x4ae0
[  211.180811]  ? save_trace+0x290/0x290
[  211.184592]  ? save_trace+0x290/0x290
[  211.188380]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  211.194334]  ? find_held_lock+0x35/0x130
[  211.198381]  ? sctp_hash_transport+0xbec/0x1510
[  211.203042]  ? lock_downgrade+0x6e0/0x6e0
[  211.207177]  ? sctp_hash_transport+0xee/0x1510
[  211.211743]  ? sctp_transport_hashtable_destroy+0x20/0x20
[  211.217269]  ? memcpy+0x46/0x50
[  211.220534]  ? sctp_assoc_set_primary+0x236/0x2d0
[  211.225363]  sctp_primitive_ASSOCIATE+0x9d/0xd0
[  211.230022]  __sctp_connect+0x785/0xc00
[  211.234450]  ? sctp_clear_owner_w+0x120/0x120
[  211.238933]  ? __local_bh_enable_ip+0x99/0x1a0
[  211.243503]  ? trace_hardirqs_on_caller+0x400/0x590
[  211.248506]  ? __local_bh_enable_ip+0x99/0x1a0
[  211.253076]  sctp_connect+0xb8/0x100
[  211.256776]  inet_dgram_connect+0x114/0x1e0
[  211.261094]  SYSC_connect+0x1f6/0x2d0
[  211.264884]  ? SYSC_bind+0x220/0x220
[  211.268591]  ? fput+0xd4/0x150
[  211.271765]  ? SyS_write+0x15e/0x230
[  211.275464]  SyS_connect+0x24/0x30
[  211.278985]  ? SyS_accept+0x30/0x30
[  211.282602]  do_syscall_64+0x1e8/0x640
[  211.286471]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  211.291305]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  211.296479] RIP: 0033:0x459829
[  211.299657] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  211.307353] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
[  211.314609] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  211.321865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  211.329120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  211.336373] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  211.345800] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  211.355716] loop4: p1 start 1 is beyond EOD, truncated
[  211.361653] loop5: p1 start 1 is beyond EOD, truncated
[  211.365750] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:43 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840))
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:43 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  211.395674]  loop1: p1[EZD]
03:25:43 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x8000, 0x0)
openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0)
ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000480)=ANY=[@ANYBLOB="070000000000000008000000010000000000000000000000030000000200000005000000000000000000000000000000000000000000000007000000020000000000000000000000080000000000000001000000000000002505000000000000700c0000000000000500000005000000000000000000000009000000000000000000008000000000240f00000000000003000000810000000000000003000000000000000000000000000000070000000000000000000000000000000000200000000000000000000000000003000000000000000000000002000000800000000000000000000000000000000000000000000000000000000500000000000000000000000000000069000000000000000500000000000000ffffffff0000000003060000ff070000018000000700000000000000000000002d030000ffffffff00000000000000000000000000000000000000000000000068d46c2b4cb61496dd"])
select(0x40, &(0x7f0000000080)={0xfffffffffffffffb, 0x6, 0x34, 0xcd1e, 0x3ff, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f00000000c0)={0x2, 0x5, 0x7, 0x544c, 0x10000, 0x7, 0x7, 0x3a65}, &(0x7f0000000100)={0x7, 0xfff, 0x890, 0x9, 0x5, 0x40, 0xffffffffffffff80, 0x7}, &(0x7f0000000140)={0x0, 0x7530})
r3 = dup(r2)
fcntl$getownex(r3, 0x10, &(0x7f0000000180))
ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x4c81, 0xfffffffffffffffe)
select(0x40, &(0x7f00000001c0)={0x7494, 0x5, 0x8, 0x9, 0x5, 0xc4b5, 0xeed, 0x6}, &(0x7f0000000200)={0x8, 0x3ff, 0x3f, 0x8, 0x49, 0x9, 0x7fff}, &(0x7f0000000240)={0xf9cc, 0x8, 0x53eb2a5c, 0x4, 0x8d89, 0x9585, 0x6, 0x8}, &(0x7f0000000280)={0x77359400})

03:25:43 executing program 0 (fault-call:3 fault-nth:7):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:43 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0)
r2 = eventfd(0x400)
ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000180)={0x0, r2})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:43 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}, {@uid={'uid'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  211.548095] FAULT_INJECTION: forcing a failure.
[  211.548095] name failslab, interval 1, probability 0, space 0, times 0
[  211.565179] CPU: 0 PID: 9477 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  211.572342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  211.581691] Call Trace:
[  211.584275]  dump_stack+0x138/0x19c
[  211.587889]  should_fail.cold+0x10f/0x159
[  211.592028]  should_failslab+0xdb/0x130
[  211.595987]  kmem_cache_alloc_node_trace+0x5a/0x770
[  211.600993]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  211.606431]  __kmalloc_node_track_caller+0x3d/0x80
[  211.611353]  __kmalloc_reserve.isra.0+0x40/0xe0
[  211.616007]  __alloc_skb+0xcf/0x500
[  211.619625]  ? skb_scrub_packet+0x4b0/0x4b0
[  211.623933]  ? sctp_bind_addrs_to_raw+0x200/0x320
[  211.628765]  _sctp_make_chunk+0x51/0x270
[  211.632810]  ? ipv6_dev_get_saddr+0x33f/0x9b0
[  211.637292]  sctp_make_control+0x35/0x150
[  211.641423]  sctp_make_init+0x5e9/0xad0
[  211.645387]  ? sctp_init_cause+0xd0/0xd0
[  211.649438]  ? __lock_acquire+0x5f7/0x4620
[  211.653653]  ? __lock_acquire+0x5f7/0x4620
[  211.657870]  ? trace_hardirqs_on+0x10/0x10
[  211.662091]  ? xfrm_policy_lookup+0x70/0x70
[  211.666399]  ? sctp_sm_lookup_event+0xf7/0x34a
[  211.671049]  sctp_sf_do_prm_asoc+0xc2/0x350
[  211.675356]  sctp_do_sm+0xfb/0x4ae0
[  211.678966]  ? save_trace+0x290/0x290
[  211.682745]  ? save_trace+0x290/0x290
[  211.686710]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  211.692660]  ? find_held_lock+0x35/0x130
[  211.696709]  ? sctp_hash_transport+0xbec/0x1510
[  211.701363]  ? lock_downgrade+0x6e0/0x6e0
[  211.705497]  ? sctp_hash_transport+0xee/0x1510
[  211.710168]  ? sctp_transport_hashtable_destroy+0x20/0x20
[  211.715691]  ? memcpy+0x46/0x50
[  211.718957]  ? sctp_assoc_set_primary+0x236/0x2d0
[  211.723786]  sctp_primitive_ASSOCIATE+0x9d/0xd0
[  211.728442]  __sctp_connect+0x785/0xc00
[  211.732407]  ? sctp_clear_owner_w+0x120/0x120
[  211.736899]  ? __local_bh_enable_ip+0x99/0x1a0
[  211.741468]  ? trace_hardirqs_on_caller+0x400/0x590
[  211.746465]  ? __local_bh_enable_ip+0x99/0x1a0
[  211.751033]  sctp_connect+0xb8/0x100
[  211.754735]  inet_dgram_connect+0x114/0x1e0
[  211.759044]  SYSC_connect+0x1f6/0x2d0
[  211.762831]  ? SYSC_bind+0x220/0x220
[  211.766534]  ? fput+0xd4/0x150
[  211.769713]  ? SyS_write+0x15e/0x230
[  211.773427]  SyS_connect+0x24/0x30
[  211.776950]  ? SyS_accept+0x30/0x30
[  211.780562]  do_syscall_64+0x1e8/0x640
[  211.784433]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  211.789280]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  211.794455] RIP: 0033:0x459829
03:25:43 executing program 0 (fault-call:3 fault-nth:8):
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  211.797630] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  211.805342] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
[  211.812596] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  211.819850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  211.827104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  211.834364] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
03:25:43 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=<r1=>0x0)
rt_sigqueueinfo(r1, 0x1c, &(0x7f00000000c0)={0x10, 0x8, 0x7fffffff})
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  211.959436] FAULT_INJECTION: forcing a failure.
[  211.959436] name failslab, interval 1, probability 0, space 0, times 0
[  211.971686] CPU: 1 PID: 9495 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  211.978729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  211.988081] Call Trace:
[  211.990665]  dump_stack+0x138/0x19c
[  211.994285]  should_fail.cold+0x10f/0x159
[  211.998421]  should_failslab+0xdb/0x130
[  212.002381]  kmem_cache_alloc_node+0x287/0x780
[  212.006952]  __alloc_skb+0x9c/0x500
[  212.010561]  ? skb_scrub_packet+0x4b0/0x4b0
[  212.014867]  ? ip6_mtu+0x287/0x410
[  212.018397]  sctp_packet_transmit+0x351/0x3020
[  212.022965]  ? sctp_packet_config+0x614/0x9f0
[  212.027460]  ? __sctp_packet_append_chunk+0x39d/0xb40
[  212.032634]  ? sctp_packet_config+0x9f0/0x9f0
[  212.037128]  ? sctp_packet_append_chunk+0x4f0/0xaf0
[  212.042131]  sctp_outq_flush+0x841/0x31b0
[  212.046263]  ? find_held_lock+0x35/0x130
[  212.050307]  ? perf_trace_itimer_state+0x363/0x640
[  212.055228]  ? __sctp_outq_teardown+0xde0/0xde0
[  212.059879]  ? trace_hardirqs_on_caller+0x400/0x590
[  212.064881]  ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[  212.069974]  sctp_outq_uncork+0x60/0x70
[  212.073932]  sctp_do_sm+0x417/0x4ae0
[  212.077628]  ? save_trace+0x290/0x290
[  212.081416]  ? sctp_do_8_2_transport_strike.isra.0+0x8a0/0x8a0
[  212.087547]  ? find_held_lock+0x35/0x130
[  212.091596]  ? sctp_hash_transport+0xbec/0x1510
[  212.096340]  ? lock_downgrade+0x6e0/0x6e0
[  212.100480]  ? sctp_hash_transport+0xee/0x1510
[  212.105059]  ? memcpy+0x46/0x50
[  212.108324]  ? sctp_assoc_set_primary+0x236/0x2d0
[  212.113151]  sctp_primitive_ASSOCIATE+0x9d/0xd0
[  212.117810]  __sctp_connect+0x785/0xc00
[  212.121772]  ? sctp_clear_owner_w+0x120/0x120
[  212.126269]  ? __local_bh_enable_ip+0x99/0x1a0
[  212.130837]  ? trace_hardirqs_on_caller+0x400/0x590
[  212.135840]  ? __local_bh_enable_ip+0x99/0x1a0
[  212.140407]  sctp_connect+0xb8/0x100
[  212.144106]  inet_dgram_connect+0x114/0x1e0
[  212.148422]  SYSC_connect+0x1f6/0x2d0
[  212.152217]  ? SYSC_bind+0x220/0x220
[  212.155919]  ? fput+0xd4/0x150
[  212.159096]  ? SyS_write+0x15e/0x230
[  212.162804]  SyS_connect+0x24/0x30
[  212.166325]  ? SyS_accept+0x30/0x30
[  212.169934]  do_syscall_64+0x1e8/0x640
[  212.173808]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  212.178649]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  212.183825] RIP: 0033:0x459829
[  212.186996] RSP: 002b:00007f86267efc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  212.194689] RAX: ffffffffffffffda RBX: 00007f86267efc90 RCX: 0000000000459829
[  212.201942] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003
[  212.209195] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  212.216449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  212.223705] R13: 00000000004bfd71 R14: 00000000004d1ab8 R15: 0000000000000004
[  212.237494] ldm_validate_privheads(): Disk read failed.
03:25:44 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x2002002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = msgget$private(0x0, 0x0)
msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88))
msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x1, 0x0)
msgrcv(r0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1ff, 0x4, &(0x7f0000000340)=[{&(0x7f0000000140)="19df91859a1f60ef68a2ccaad72204efd276a27685b0cc0bae56ea958fa24049eb9be9638f70d4262fd912c6a8309c2e27020f5820a95efc6acd3a037e7f0910cfd4a356c30e1a4ae13fb5a10f06de0d8631b8be6f9ad26385cc1c5c58", 0x5d, 0xfffffffffffffffe}, {&(0x7f00000001c0)="d7b2d354c3fb8905aab68cfea809d9bfc1c9492b9ba209bd4a7165d3dc796758bc728048fd343fbac83abbae579f0a2748a1b1c10b27a2de874eba3de1bb8e176d7468020a3a62f916cb022b74e828d0ee8fa98816cae63bfb42d3a311f413525ea232c030dce01d597f76885fe567bab7d712583cc6c8463bee", 0x7a, 0x2}, {&(0x7f0000000240)="21acd1aae0b40ad8bd8a1e216417c88777d0bb848d8b44ea8df2267466e001dfda564f4e1332628678487f13a8a247c0887338e1f5131f4d9c9be39658c166bab1d1937b4f3150fee7d1ca9e5264ff86b5b945", 0x53, 0x7fff}, {&(0x7f00000002c0)="f6a8befe94b6636482b301e8cf4c829142abe0e950ea3c6486658f542a1d1fc1bb821b6aed4542c230fdaf6d3da1e8694ca86349fe96a1e6456653a2b8a4bbebc24a", 0x42, 0xffffffffffffffc0}], 0x22002, &(0x7f00000003c0)={[{@noinline_dentry='noinline_dentry'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0x5}}, {@whint_mode_user='whint_mode=user-based'}, {@disable_roll_forward='disable_roll_forward'}], [{@obj_type={'obj_type', 0x3d, '/'}}, {@smackfsdef={'smackfsdef'}}, {@smackfsdef={'smackfsdef', 0x3d, 'posix_acl_access'}}, {@subj_user={'subj_user', 0x3d, 'vmnet1'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]})
msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})

03:25:44 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x2, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  212.255772] ldm_validate_privheads(): Disk read failed.
[  212.265278]  loop4: p1[EZD]
[  212.269284]  loop5: p1[EZD]
[  212.286893] loop5: partition table partially beyond EOD, truncated
[  212.293875] loop4: partition table partially beyond EOD, truncated
03:25:44 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  212.322205] loop5: p1 start 1 is beyond EOD, truncated
[  212.328447] loop4: p1 start 1 is beyond EOD, truncated
[  212.342960] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:44 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840))
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  212.395314] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:44 executing program 3:
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80, 0x0)
shutdown(r0, 0x1)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x51a, 0x4, &(0x7f0000000200)=[{&(0x7f0000000340)="2d53d8737051e108c85cf159b311aac5777b16c865d44f18e2972053b85f153a1b0dc87ebfc8ea9561cb58af7738736f794995c6260b1e0d0d0e89682a2fb407354a5ca5b1d2aa709bdae6ca0bd6cf934247d5f8ca6783d276393406c8055d129a9686fbe9136bd884a7dc1d306db0aaf0258879b693a25bc1ed9a848cffc9b31d95ad40b82193885d820a226932", 0x8e, 0x1}, {&(0x7f0000000400)="07bbaf5568504e2342be84c799776cebbcbe80c4e5f7d43fb28d9b12bcb968087d2f3b147d92a15afa0e694a5547ef992a44e3f3b37a6495d64efe670bdc4880830fb73b5eb8835ce0cc6dd9669e53b9215d5d09fd570de45aa71d709405bb72e63f7703d52e93cde85066d9c6ae4e7c57644cd6a59c6f30c0de70df8694c86af135ae77774db908ab469a465e469cd80ab188bc872ff99286e4cde4ca3d9e0e8da0c438f575789b3ff6f2bdc7c2c76ddb2f535f77b073c51af76950f4ea6e446ba6eb306026f4addba0730e3c30f77109dcb51bd4a339d62fb215", 0xdb, 0x20}, {&(0x7f0000000500)="885ffd3a858bf3df68731c06a2a69895e38b1b4c6b264c5aefad6b15255aef1a531af582362eb1b11fec4c61285d1db5c358f781bd52855b51c266f05744cdb37575e4829ee2ceb375dd4483b44237b35155b775c0709cfb2ffcacbf585780287ce01724f286cb3d9df22cb98e9c10a68b964e60046c6c9432e7bd3959f5e6b8d0f0054f7ae00550b90f55bc21698434631fbb54052aabad7dce22daa97620f776ceba43458b4730e800f7e13e2491eba1f3d9925c295cb96efa96c60190f1ebdb3303334cb79e81527687ee2dd945d95df1df6f2ee87a8a963a9b55be8804d42771987380a825bd29685ac026746e4822bada0658", 0xf5, 0x7}, {&(0x7f0000000600)="c022bf4c3b285c98eb69cd23a5c4c747aef1799a4d37d736adf4053c742f992825afb4a71f4cb54b00725b96b6945f3dbf95f6c9001d25cc51ca70f98618b6b3e4fad356eac920fcdfcfec1ce14dab7a5c30c9758f92a6513348d3f43bef94d8251003244dd5e2b63e748d32a86fb5ce52e0b403339f4949f0d23aab49b8ce33743ef178f7dab9911f8833050b9ed279f8d9b9cbb0a530b8dd16f3c10a2218d2ec5c7e01c7057ab5636f7500f56d674c1f8d6ad371db64909143f2520d30807bf0f65fefa32550b95ec902c2", 0xcc, 0x7fffffff}], 0x820, &(0x7f0000000700)={[{@barrier='barrier'}, {@nossd_spread='nossd_spread'}, {@subvolid={'subvolid', 0x3d, 0x28ed}}, {@compress='compress'}, {@nodatasum='nodatasum'}, {@noinode_cache='noinode_cache'}], [{@appraise_type='appraise_type=imasig'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]})
ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000002c0)={0x7, 0x4})
shutdown(r1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={<r2=>0x0}, &(0x7f0000000040)=0xc)
capget(&(0x7f00000000c0)={0x19980330, r2}, &(0x7f0000000100)={0x3, 0x0, 0x8d60, 0x6, 0x5, 0x8000})
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  212.443373]  loop1: p1[EZD]
03:25:44 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:44 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x2002002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = msgget$private(0x0, 0x0)
msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88))
msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x1, 0x0)
msgrcv(r0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x1ff, 0x4, &(0x7f0000000340)=[{&(0x7f0000000140)="19df91859a1f60ef68a2ccaad72204efd276a27685b0cc0bae56ea958fa24049eb9be9638f70d4262fd912c6a8309c2e27020f5820a95efc6acd3a037e7f0910cfd4a356c30e1a4ae13fb5a10f06de0d8631b8be6f9ad26385cc1c5c58", 0x5d, 0xfffffffffffffffe}, {&(0x7f00000001c0)="d7b2d354c3fb8905aab68cfea809d9bfc1c9492b9ba209bd4a7165d3dc796758bc728048fd343fbac83abbae579f0a2748a1b1c10b27a2de874eba3de1bb8e176d7468020a3a62f916cb022b74e828d0ee8fa98816cae63bfb42d3a311f413525ea232c030dce01d597f76885fe567bab7d712583cc6c8463bee", 0x7a, 0x2}, {&(0x7f0000000240)="21acd1aae0b40ad8bd8a1e216417c88777d0bb848d8b44ea8df2267466e001dfda564f4e1332628678487f13a8a247c0887338e1f5131f4d9c9be39658c166bab1d1937b4f3150fee7d1ca9e5264ff86b5b945", 0x53, 0x7fff}, {&(0x7f00000002c0)="f6a8befe94b6636482b301e8cf4c829142abe0e950ea3c6486658f542a1d1fc1bb821b6aed4542c230fdaf6d3da1e8694ca86349fe96a1e6456653a2b8a4bbebc24a", 0x42, 0xffffffffffffffc0}], 0x22002, &(0x7f00000003c0)={[{@noinline_dentry='noinline_dentry'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0x5}}, {@whint_mode_user='whint_mode=user-based'}, {@disable_roll_forward='disable_roll_forward'}], [{@obj_type={'obj_type', 0x3d, '/'}}, {@smackfsdef={'smackfsdef'}}, {@smackfsdef={'smackfsdef', 0x3d, 'posix_acl_access'}}, {@subj_user={'subj_user', 0x3d, 'vmnet1'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]})
msgctl$IPC_SET(r0, 0x1, &(0x7f0000000700)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9})

[  212.593203] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use)
03:25:44 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={<r1=>r0})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e21, 0x3ff, @dev={0xfe, 0x80, [], 0x23}, 0x1000}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}], 0xffffffffffffffa4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000)
getdents64(r2, &(0x7f00000000c0)=""/185, 0xb9)
ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000040)={0x0, @aes256})

[  212.681749] ldm_validate_privheads(): Disk read failed.
[  212.690932]  loop5: p1[EZD]
[  212.707803] loop5: partition table partially beyond EOD, truncated
03:25:44 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0xc00)
setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4), 0xffffff98)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:44 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2003, 0x0)
write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  212.731269] ldm_validate_privheads(): Disk read failed.
[  212.740971]  loop4: p1[EZD]
[  212.748372] loop5: p1 start 1 is beyond EOD, truncated
[  212.754576] loop4: partition table partially beyond EOD, truncated
[  212.803484] loop4: p1 start 1 is beyond EOD, truncated
03:25:44 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:44 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:44 executing program 2:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0)
close(r0)
close(r1)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={<r2=>0xffffffffffffffff})
ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000280)={'lapb0\x00', 0x3})
write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00)
close(r1)

[  212.856099] ldm_validate_privheads(): Disk read failed.
[  212.863192]  loop1: p1[EZD]
03:25:45 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x880, 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0)
setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)={0x2, "ddca"}, 0x3)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  212.914175] loop1: partition table partially beyond EOD, truncated
[  212.947365] loop1: p1 start 1 is beyond EOD, truncated
03:25:45 executing program 0:
r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2)
ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000340)={0x2003ff, 0x5000020000000})
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa)
r3 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='trustedtrustedppp0^[md5sumnodev-vboxnet1selflowlan1\x8e\x00', 0xfffffffffffffff8)
getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8)
lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f00000002c0)=@v1={0x1000000, [{0x42, 0x7f}]}, 0xc, 0x3)
r5 = getegid()
fchown(r1, r4, r5)
keyctl$unlink(0x9, r2, r3)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0xffffffffffffffff, @loopback, 0xfffffffffffff7fe}, 0x1c)

03:25:45 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:45 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
clock_adjtime(0x5, &(0x7f00000000c0)={0x45301700, 0xfffffffffffffff9, 0x8, 0x100, 0x80000000, 0xffff, 0xe2, 0x8, 0x3, 0x7fff, 0x2, 0xa42c, 0x8, 0x8001, 0x8, 0x3c9, 0x0, 0x20, 0x3, 0xeb, 0x1, 0x0, 0x4, 0x0, 0x80000001, 0xffffffffffffffe0})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  213.151623] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:45 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @broadcast}}, 0x33b)

[  213.192008] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  213.213645] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  213.234496]  loop5: p1[EZD]
03:25:45 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  213.251338] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  213.297319]  loop4: p1[EZD]
03:25:45 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:45 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x69, 0x103)
r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xfa86, 0x123401)
ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x0, r2, 0x1})
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  213.319118] loop4: p1 size 2047 extends beyond EOD, truncated
[  213.333296] ldm_validate_privheads(): Disk read failed.
[  213.339416]  loop1: p1[EZD]
[  213.351865] loop1: partition table partially beyond EOD, truncated
03:25:45 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
socket$can_bcm(0x1d, 0x2, 0x2)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  213.398426] loop1: p1 start 1 is beyond EOD, truncated
[  213.411624] loop_reread_partitions: partition scan of loop4 () failed (rc=-16)
[  213.425592] print_req_error: 3293 callbacks suppressed
[  213.425598] print_req_error: I/O error, dev loop4, sector 1
[  213.446663] print_req_error: I/O error, dev loop4, sector 1
[  213.452547] buffer_io_error: 3288 callbacks suppressed
[  213.452553] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  213.465674] print_req_error: I/O error, dev loop4, sector 5
[  213.471994] Buffer I/O error on dev loop4p1, logical block 1, async page read
03:25:45 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000700))
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  213.502480] print_req_error: I/O error, dev loop4, sector 1
03:25:45 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  213.502494] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  213.502560] print_req_error: I/O error, dev loop4, sector 5
[  213.502567] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  213.502634] print_req_error: I/O error, dev loop4, sector 1
[  213.502641] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  213.502915] print_req_error: I/O error, dev loop4, sector 5
[  213.502922] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  213.502993] print_req_error: I/O error, dev loop4, sector 1
[  213.503000] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  213.504107] print_req_error: I/O error, dev loop4, sector 5
[  213.504117] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  213.505225] print_req_error: I/O error, dev loop4, sector 1
[  213.505233] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  213.505295] Buffer I/O error on dev loop4p1, logical block 1, async page read
03:25:45 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)
linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0)
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x5}})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x1000000000002, 0x0)
r2 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000))
connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x9918)
dup3(r1, r3, 0x0)
tkill(r2, 0x1002000000016)

[  213.673401] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  213.673411] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  213.673441]  loop5: p1[EZD]
[  213.844122] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:45 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0xfffffffffffffff8, 0x0, 0x0, 0x26}]}, 0xffffffffffffffd5)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{}]})

03:25:45 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:45 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x200004e23, 0x0, @loopback}, 0x1c)
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0)
symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00')

[  213.874751] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  213.912247]  loop4: p1[EZD]
03:25:46 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fff, 0x2000)
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="20000000c792c29563878b39394606147895c9409133247cd5395cc3f11bd2ae62d80975d894f460bd594634", @ANYRES16=r2, @ANYBLOB="10002bbd7000fbdbdf25150000000c0009000800020001000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000050)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
bind$inet6(r1, 0xfffffffffffffffe, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  213.928670] loop4: p1 size 2047 extends beyond EOD, truncated
03:25:46 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[{0x6, 0x8, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x15)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:46 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:46 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1000, 0x500)
ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000000c0)={{0xba, 0x8}, 'port0\x00', 0xc0, 0x20, 0x101, 0x58, 0x8, 0x259, 0x7, 0x0, 0x3, 0x7fffffff})
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  214.022770] ldm_validate_privheads(): Disk read failed.
[  214.028276]  loop1: p1[EZD]
[  214.088740] loop1: partition table partially beyond EOD, truncated
[  214.111782] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  214.121896] loop1: p1 start 1 is beyond EOD, truncated
03:25:46 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
r1 = socket(0x1, 0x56dccf946c95af4d, 0x7)
getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={<r2=>0x0, 0xa8, "4dba7496185c37df9dc1729b4114a927c4da78250a1fc1ef9da89d0b68dad9354c7da3b960fcb132d3c9ac6833688b3bdbc5a4bbfc56387f4f9748e61617133332b656363fc1dd241a232ca391a077032c137e4d8217bee5a860da00f9c0ea1df52369307eeaa7272df4a570bfc3b29c976196b913f932f6fff1c1de6cb5466e9237c77d0fe2f093d35581a6225fc8ca6fbe80adddc46f5ec299471ab5fc69657234e12bfeae60d8"}, &(0x7f0000000200)=0xb0)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={<r3=>r2, 0x7, 0x2d}, &(0x7f0000000040)=0xc)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x7f}, &(0x7f0000000100)=0x8)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  214.146530] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  214.184095]  loop5: p1[EZD]
03:25:46 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)
linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0)
ptrace$getenv(0x4201, 0x0, 0x0, 0x0)
ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x5}})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x1000000000002, 0x0)
r2 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000))
connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x9918)
dup3(r1, r3, 0x0)
tkill(r2, 0x1002000000016)

03:25:46 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x9, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setxattr$security_selinux(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x2)
connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x184)
r1 = open(&(0x7f0000000040)='./file0/../file0\x00', 0x80, 0x80)
ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000000)={0x4, 0x8, &(0x7f00000000c0)="954e11eb25bbdee03a12f95466b4c984acd8acd44de1efa7c7d4e73204ab7c4ff15ab5c57c25e5842a921647c1786c45a61d4568685c1307f16db13399272c4fb17cc90a19303f59469cf965a6216d6f984406951257c531cfc7b622bd41124dc862bedd244a70248ce0e78f83b09662e8789c9847919a6966384e0df60e9f8da3e2f5d4470c929c1ad57ff6fc60920ba60ca50bf1a5ebcdd63a9560de7309825b34e840667885ebb2dc08557b49e238269a6bd43de0b35cb154c049fda4512e8a8ae874bb7570e7a15d484e019a166b28ca16addd1de61fd2e764872c38c1e2c6043aa0", {0x7, 0x3f, 0x47504a4d, 0x1, 0x0, 0x8, 0x0, 0x2}})

03:25:46 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:46 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:46 executing program 3:
r0 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2)
getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000180)=""/87, &(0x7f0000000200)=0x57)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x1, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
socketpair(0xa, 0x7, 0x3ff, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={<r3=>0x0, 0x8}, &(0x7f00000000c0)=0x8)
setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r3, 0x4, 0x100000001, 0x4}, 0x10)

03:25:46 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x2000)
connect(r0, &(0x7f0000000200)=@caif=@rfm={0x25, 0x4, "21a1be340595a345531bb4296f7b06d5"}, 0x80)
ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000100))
r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00')
sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c000000467388b3cdcd3ba0f83ef7ba5bac732f4ecaa56bc075c06de35e18352a6ee0d6ded5e79bd72406b5bde3e26971f9f10228bfd9c31161d89a08b17cb5fe443aaea27a927378c9d307ae2d5aadce342ec88776476752ebc5f24117ff84f90670ba245a80058cef3df0ae9887486683b0083ce515061337b867d543dee1ff88de1b9d92c967be1d81ecd7b9a8e3186f05e19ee5dc183408", @ANYRES16=r2, @ANYBLOB="000226d77000fbdbdf250300000008000600010000000000048d7b0004005f0e0002ff07000003000000080005000300000014000100fe880d64000000000000000000000001000000000000a5bd7295299773dc09c66ca80494d401ffc5d958323935e5cb1ee13deec889ede5e322c4d0847c6c31917dd736feba8ba0"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x41)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  214.400850] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  214.433262] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:46 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1a1002, 0x18)
getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000100)={@mcast1, <r2=>0x0}, &(0x7f0000000140)=0x14)
ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000180)=r2)
r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000000000, 0x0)
setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  214.486881]  loop4: p1[EZD]
[  214.519679] loop4: p1 size 2047 extends beyond EOD, truncated
[  214.551377] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:46 executing program 2:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6, 0x0, 0x33}}}}, 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@flushsa={0x14, 0x1c, 0x507}, 0x14}}, 0x0)
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00')
sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r2, 0x424, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x20004000)

03:25:46 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  214.561259] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  214.567430] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  214.583182]  loop5: p1[EZD]
[  214.585226] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  214.595674]  loop1: p1[EZD]
03:25:46 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40, 0x0)
getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={<r2=>0x0, 0x8001, 0x7fff, 0x5b6, 0x10000, 0x3}, &(0x7f0000000180)=0x14)
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x1}, &(0x7f0000000200)=0x8)
prctl$PR_MCE_KILL_GET(0x22)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)="7c1ad33337", 0x5, 0xfffffffffffffffd)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:46 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:46 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={<r1=>0x0, 0x7}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x8)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:46 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x8}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:46 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x2000)
connect(r0, &(0x7f0000000200)=@caif=@rfm={0x25, 0x4, "21a1be340595a345531bb4296f7b06d5"}, 0x80)
ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000100))
r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00')
sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c000000467388b3cdcd3ba0f83ef7ba5bac732f4ecaa56bc075c06de35e18352a6ee0d6ded5e79bd72406b5bde3e26971f9f10228bfd9c31161d89a08b17cb5fe443aaea27a927378c9d307ae2d5aadce342ec88776476752ebc5f24117ff84f90670ba245a80058cef3df0ae9887486683b0083ce515061337b867d543dee1ff88de1b9d92c967be1d81ecd7b9a8e3186f05e19ee5dc183408", @ANYRES16=r2, @ANYBLOB="000226d77000fbdbdf250300000008000600010000000000048d7b0004005f0e0002ff07000003000000080005000300000014000100fe880d64000000000000000000000001000000000000a5bd7295299773dc09c66ca80494d401ffc5d958323935e5cb1ee13deec889ede5e322c4d0847c6c31917dd736feba8ba0"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x41)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  214.736492] audit: type=1400 audit(1564716346.775:57): avc:  denied  { write } for  pid=9756 comm="syz-executor.3" name="net" dev="proc" ino=35593 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1
[  214.826303] audit: type=1400 audit(1564716346.785:58): avc:  denied  { add_name } for  pid=9756 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1
[  214.952322] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  214.966027] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  214.967570] audit: type=1400 audit(1564716346.785:59): avc:  denied  { create } for  pid=9756 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1
03:25:47 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
fcntl$setpipe(r0, 0x407, 0x58)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xd, 0x88301)
write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0xfffffffffffffff5, 0x3, {{0x401, 0x8, 0x7, 0x0, 0x4, 0xdf3d, 0x9, 0x8}}}, 0x60)
ftruncate(r0, 0x7)
ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000200))
bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r1, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:47 executing program 2:
r0 = getpgrp(0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x3f)
ptrace$cont(0x18, r1, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0xfa})
ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r1, 0x0, 0x0)

[  214.981455] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  215.012580] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  215.036457]  loop4: p1[EZD]
[  215.045605] loop4: p1 size 2047 extends beyond EOD, truncated
[  215.051035] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  215.061438]  loop5: p1[EZD]
[  215.069114] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  215.078132]  loop1: p1[EZD]
03:25:47 executing program 2:
r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x140, 0x0)
getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@empty, @loopback}, &(0x7f0000000100)=0xc)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x13f, 0x9}}, 0x20)
write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r1, 0x1d6a}}, 0x10)
r2 = socket$inet(0x10, 0x3, 0xc)
r3 = dup3(r2, r2, 0x80000)
ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f00000001c0))
write$selinux_attr(r0, &(0x7f0000000200)='syst:g\x05L$IC\xcc\xf5ime_t:s0\x00', 0x16)
sendmsg(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f00000000c0)="2400000002061f001cfffd946fa2830020200a000900010002e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0)
ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000140)=0x1000)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000180)=0x2, 0x4)

03:25:47 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:47 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:47 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/78, &(0x7f0000000140)=0x4e)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr="b180dfb48d1ce3b8a55d60ab209f455c"}, 0x10)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x5, @empty, 0x81}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e22, @rand_addr=0xff}, @in6={0xa, 0x4e21, 0xc0, @loopback, 0x20}, @in6={0xa, 0x4e22, 0x1, @mcast1, 0x9}], 0x74)

03:25:47 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:47 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x0, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:47 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30)
r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2000, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x335, 0x7, 0xffff, 0x1, 0x5}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  215.270211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'.
[  215.321276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'.
03:25:47 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  215.380718] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  215.393999] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  215.412152]  loop4: p1[EZD]
03:25:47 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
ioctl$NBD_DISCONNECT(r1, 0xab08)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000640)=""/4096)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0))
r2 = syz_open_pts(r0, 0x0)
ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x965, 0x0, 0x0, 0x8})
ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040))

03:25:47 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='ip6gre0\x00')
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2a}]}, 0x1aa)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)

[  215.425923] loop4: p1 size 2047 extends beyond EOD, truncated
03:25:47 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
accept(r0, &(0x7f0000000000)=@sco, &(0x7f00000000c0)=0x80)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  215.511061] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  215.531124] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  215.548771] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:47 executing program 2:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
preadv(r0, &(0x7f0000000000)=[{0xffffffffffffffff}], 0x1, 0x0)
close(r0)
r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x5, 0x0)
r2 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0)
ioctl$LOOP_CLR_FD(r2, 0x4c01)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={<r3=>0x0, r1, 0x0, 0xe, &(0x7f0000000040)='/dev/snapshot\x00'}, 0x30)
ptrace$peekuser(0x3, r3, 0x80000000)
ftruncate(r2, 0x87ffd)
sendfile(r0, r2, 0x0, 0x800000000024)

03:25:47 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
sendmmsg$inet(r1, &(0x7f00000015c0)=[{{&(0x7f0000000000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001440)=[{&(0x7f00000000c0)="0f54020563066f58a86d12374a2d8ae1ba2353d593a0d3c279c25d6cbcc5245e267e8e205a22c6a1d1465704dffb8ee400d73ef3f81af6eb6048daa56cc168f171244e33b0e8617be9093d440570aa37a7fd6a6e4377d47136dba0595426a9d40f242a33354b016e09d74cb1e8ab5db14cc5cfb892893f4cc7d9ed71a1ae91b798a612ca46deb555c57ba242cffca95d", 0x90}, {&(0x7f0000000180)="4ba733bff66c3de154335e603315279dc785b508ebc3b01c53c712c4e64bfa83980e49a98bbbe00b08dd796db0077a508a466677304ac8874c6abfd2a1e87aa11024d982d4da362317b3aa2b69268eb3ad8753006fdfc3683ef68a087d720881e87ada538ce32ef978e1496024139aae0e0a3c31172d813c028d5a5a8f9d1bcd176255b3e9baf660f63cc6485e14", 0x8e}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000040)="48da0a64b893630bc6e7e68b8a190d7b6480ff5be684bb7746b6e3058b57e67232", 0x21}, {&(0x7f0000001340)="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", 0xfa}], 0x5}}, {{&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000014c0)="3a0c22e992a6e120065bf16f395f13bceeb488ec681be7595564cca10cf63e22eab9b0888b855c244e9dc52a0a52e57463c0aae1c9073c8844e76410f5efd2620332ef8dbb796092eea05b2b877e82df99", 0x51}], 0x1, &(0x7f0000001540)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x48}}], 0x2, 0x4000)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r2 = openat(0xffffffffffffff9c, &(0x7f0000001640)='./file0\x00', 0x400, 0x34)
write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000001680)={0xa, 0x6, 0x6, 0x200}, 0xa)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  215.564365] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  215.585537]  loop5: p1[EZD]
[  215.588976]  loop1: p1[EZD]
03:25:47 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:47 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:47 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80)
ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0], 0x1})
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:47 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:47 executing program 2:
r0 = syz_open_dev$vbi(0x0, 0x1, 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sysinfo(&(0x7f0000000000)=""/22)
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0)
r1 = socket$inet(0x10, 0x2, 0x0)
ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000080)={'vxcan1\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}})
stat(&(0x7f0000000140)='./file0\x00', 0x0)
ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000040))
setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000600)=0x629, 0x4)
fchown(0xffffffffffffffff, 0x0, 0x0)
sendmsg$sock(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="6dd46033520581a69d09f2cffd74efc76777b850aac6bc61166ab051e5c9db383653cdbd05ef03dfe678030b951e28da8ff7a15c155052e29cb50574d57689b64ddaa3f87d8b8e0fb1d9cdfc8bcd6bea549d56c94fd7d5697ba722ee61504319a9981be47d98d9677039306f27fc63772d2f157fcf6c8af05310dec72e6eecc7b330f4013561d70edb878ccdf89f2fdf58ea70cb5f1d713793e400f558f1cd5f230107a4a935ccb214f994e24d92ca640d9b6ac41551981ab7559bd251d38abb68686169822aaa9c059e907259fe11", 0xcf}, {&(0x7f00000002c0)="0164d0a3ec9881be6ba12f19adb0efc29e93c25626a7feced0ed066cdead8e2ae4257f556753d2109a0c9d11cde8afc920e367866e46b6917d9f253974d106e2153e6fb287b44aa119baf7bc49307e5da1fc5984c0ae36339a15e1c4e93d68a416d6b0e7cea2171732de2c54", 0x6c}, {&(0x7f0000000340)="3148b25e4d899db7dce96d38c895ecb6e5055e734fc285aa14dde7be1009aeb963bf82b7a431a823e2af17f1ee3a7084fb9c2462d8db25607d795513f7bb6978609cc46d1b82866e303470135d5e3484dcdfa757d45688646f1dc433e3e1c4b7222bc43bb6fc89e8e8d6396699af10f252fc20cda83904efd0b033b1f0a7147e131b1983a97f73d99daaec7bcabe30f5fd96", 0x92}, {&(0x7f0000000400)="41a0b92dcdf16f9ce8eabefc75589ba655d8105f82d7520f3f295fbaaf68f2dc0694882538186c13086bd0eae3c44986f99c7a8b7fa01c8a8a9e1669a963b5db1095eb457faf845671df5c7969853b1517bd2b677bde805715c830b381493af08744e1e4b835d6167a163a5e16ff4548d1f9bb367f4c9e5215ce803b46e25ec98439b2b6ca83595f9802c017185764f5f55f8f9ce4da5badd8712671b3694873054713d33395e0cd2671c452b8a21366b8c19e64880f743bd24b601abcb115c0fd1e3b74a50ae69c14ac0f27d45c33e5e40861326ba8919ece36610eec7a9b111f77310bd73889a9b258a80d377ab9a60faa3e1f3fd8", 0xf6}], 0x4, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffffffffffffc}}, @txtime={{0x18, 0x1, 0x3d, 0x91}}, @mark={{0x14, 0x1, 0x24, 0xffff}}], 0x48}, 0x80)
ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\x01', @ifru_flags})
ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1)
ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000680)={'irlan0\x00', {0x2, 0x4e22, @loopback}})
ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100))
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x8, 0x4)

03:25:48 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001280)={<r2=>0x0}, &(0x7f00000012c0)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001400)=0xe8)
getresgid(&(0x7f0000001440)=<r4=>0x0, &(0x7f0000001480), &(0x7f00000014c0))
r5 = fcntl$getown(r1, 0x9)
r6 = getuid()
getgroups(0x3, &(0x7f0000001700)=[0xee00, <r7=>0xee00, 0xee00])
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000029c0)={<r8=>0x0}, &(0x7f0000002a00)=0xc)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002a40)={0x0, <r9=>0x0}, &(0x7f0000002a80)=0xc)
lstat(&(0x7f0000002ac0)='./file0\x00', &(0x7f0000002b00)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000002b80)=<r11=>0x0)
r12 = getuid()
lstat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, <r13=>0x0})
ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000004140)=<r14=>0x0)
fstat(r1, &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
fstat(r0, &(0x7f0000004200)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
sendmmsg$unix(r1, &(0x7f00000042c0)=[{&(0x7f0000000700)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000780)="b59099d953680586b1c6eacd2192f1bfa26bc1c5acf2492f772b649c1534c0f42a84c7301cdd20df19e2e2b51af35214dbba050f6aeb800ee09cf1f05d92dbb6cc3ddfe3f37b67f79dea6041d03d54dc80de4c6f2fc7900f85456a1c22e138475fd0a1f457fb15c9899f4fe3c51b883fcc92dde33bf523aaac2a5a5da062e619d121af48a15256ea4c34228eb8f6acd3ab3b4dae46071a4413c31d8a00069edbafd12f7a27e516133b833f6b2b99b26db4321253736f13407fa61098c6c9dcd9f377e380c5", 0xc5}, {&(0x7f0000000880)="fb2b2ab8ba11fafdc249270bf858aa1c8c6f6eb1a366890d18acb9d587fce42b7dcb6e419064694fde64c50819e261131a50d6553981a68e6b0cf75e084a48bcb49f88704e5e00f9d624b35f8adcf786", 0x50}, {&(0x7f0000000900)="8bb0acfc4ef68c3f57407cfc03576f1988c1d53273d63f5fe45a8f4de6c4cc64a8e9c0f655c38c7c81a7f2b654b7c414728289458f2f124c20cfd2083f32f733bc707f223cb947833f1767862696999305d05665518baa80a560a728a7b4d2c963f16d58cf91a733dbb5eb636ca7ea43c8088d7f77a041d3361fef31615698a388f2c64f74cf55282aefdb0bae2d503271a664aec91f437c0af1aa1159264b36808c8e9527a7fba6da9498620fdf0d62ab68a20e8428fd362b09244d", 0xbc}, {&(0x7f00000009c0)="96119a376477f7b9e49e4dca9ee78758541c26d5971b8ae7651f87a60ed4fcaef894abfa940a5ff5ede236eb0bdbe7ea8b0f90f63c50b790030de6cc0e8f9b418ce1813939de1fe026bc190677722cf7ce1185c68f16e7329e1e9f014678a7eea946a5c8ca7f6df56a68b8d3e5b6e07e5972c5c8f3bf2bd1bca701", 0x7b}, {&(0x7f0000000a40)="40ae94f48f674efa20c8eb9f88d459b9051cc5554e623ec4a77b0d2f326097fd51fb36a839914a8fd653da9c83808741899687e4574482338996b69ec735fa440899daa15ae4434bb47f24c7b187e6cf4bb6da74c546a3cf521cc558f280ea90f3976d5452dfab0e99c138d40507739af8752ffc9c15ce62b985dee2d0b7420e39396a020e4ebbe0a6d846d77e600f9a5de1094f07470b10b244672aa6680eb1aba5e35522c4b047ecb9618d059eba4a573c19242d5e67493d714860524a2c8b82f78251d96cd02fc79b10c8a6ed1d0abac6f947f37b36fb2846eb1f15c42203e19aa872780fd4a8c3a007251a832cc343162f3aab0f18a8e4", 0xf9}, {&(0x7f0000000b40)="4a1ae60007b7d492f36c565fcc2230c4f14a503299c91fe2538f60251fd328757b805be2a3c2a875014bb03551e7d34eac2f63ee6c6b84f87d6c0520ce3637352cd1674b0eed3e71a44d9a46bf05185d917d8ab1081d0b5d2b9f74735d01a0f49ab9c718c67f734af3e7825d17d55bdcc078a6812a869d3daab83037b81966987b2dae", 0x83}, {&(0x7f0000000c00)="d92169f4e45f09ed6193ce3423eaf97d01738f8dc65b217a0e65c6b0c165320169fb1656bbda66db6f5705b1163c02dd168ab9d08ed08a69c4523716f7e0968dbca6b3c3850f45e44cddf8b45a0b99e4a3ebf3e7f1f92dfdc71aedf315dc8550d7947e57f32db40ce539e9b3abaa5c35b6cf48102a5e8f29c08fcc295729713cabda343f1a789ed114356e56f6ceea92c664892fbc0eefd02f169100d9eb7425aaa01b8d6e7f054590427cf3f287da72d32d3c91619767ef06724ff2a70bdc16b1", 0xc1}, {&(0x7f0000000d00)="eb7216399ef008118748ca67600439980cc5177cad19f00f76cb5f9c129bc4799a943b49a029c9f373cd358bd4c1ad32ac2ad825058e3c5775f87c612fd7cff547078a92b6ea19", 0x47}], 0x8, 0x0, 0x0, 0x10}, {&(0x7f0000000e00)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000e80)="782c83d41f5b58d3d97bdb4542bfedad7f0c1c0c752f42b9260ef62b3462d7f04209d36f32696965de2891c23dca5aabb1ef56c58a59bb81263f9523c71c943bc3934404e6b13aafc898d173d4457afd8d73be8f9fdedc8968a6721c378ba1f765574f408bd994f9571618f1b6c62d8674af658b61d8399c8957e9e731667f9be178c66ce4a0d1595f83a90099d603af0b94b16e6d9d1c518897c6f064a5069ff7d32282e54c3d103925386f1521f67cb6eb210c505d38d9f0cfa514bce80aef118fff9efa537090", 0xc8}, {&(0x7f0000000f80)="47419e64404210947f7f652b249eba6864be1ba924d6168fde01d60d5d67fd12ab73b1bda046e1630059ad43d415163dc1c8e2bc814e7e25fc654a7d0032e7740d1e1da5547981498f314afbcd46367c7b3add79b5c6468b8f576917c5163ee35207f4db7e716d9071addd219a9d9742f85bb9f708d31db12fe7f34d9fe02f2df6b79551b825bc114678763f000ae913dfd99bf63b62c075288bb5359764ce82e2733d3db734673566ca44aa22c9e280dd44eddc25670a3d2231149cbfacce3c36c42a1bd9a67b5d6958d888c3528c81701a87ca198b90e48902ebf5107f3da3ab2a4e59b2495309", 0xe8}, {&(0x7f0000000500)="5c676fc94ef8fee14a4ea62827cce6859d53518ea1ba492b3e00bdfb21c60284832d9ee7a9185dd39f3d2cb635", 0x2d}], 0x3, &(0x7f0000004540)=ANY=[@ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00678eb61177a6d8dd9bbf921a0daa613e01d7ee55c61311b5319821434f3a54e5df216acd213976f5aef8bcb95fed2df0d86d6be4c83aba53fe1bcb1b8622a43c3a95fd322b3e70e9b6846b57a1ddd6e3083182e942a30d368e3b4a8e8c1205d60f71437cabc588ee0df3f15b3859b7ed66717bebff0d0f90a5b4a5abd693cab0337978c57c7e3cea96c1d6b7d0c76e8aa2c5470800000000000000638d040e23da5dc07ef85dfcd5c6f18a9dbc4e491c4bc6f290b82b1acd2f69c34f5b5409dc96"], 0x30, 0x4000}, {&(0x7f00000010c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001240)=[{&(0x7f0000001140)="44c918e685019fe38ac6496421270f2d1c1fd91d5b2af5c39661827f1ca503d1ec82fcd26051049bc3efef64e9e0444c5076edcec0487cd269a1272af8e275bc673f911257604ddf750dd6f0b91e815ec9e4a99031a2d049187ce52f559fc74876487fcdea57ce6f5ca65bfab6444a2d7fc107d768cf33aa894a5ba4bea79e998d14bed0c77bed95c2fe41f203535865de6deb7f431b9387505b23ff55b69584588c49208468de755db6f159da37cb46bf09999494b2e626b37e88ba04be2c68befd0bb389a5202126ab3b75d221c9c6207983680666d4dde2b048e743ee6082aad1de25a3dd3ded7b306a95649eacda066fcd", 0xf3}], 0x1, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}], 0x20, 0x4010}, {&(0x7f0000001540)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000015c0)="dad3365e6203c1019bd89a9ee49232daee", 0x11}, {&(0x7f0000001600)}, {&(0x7f0000001640)="dee9f2db9ff60be6658e77a2de4e115c81e40ed6c4d6d84a2e38c27b9d9d904ff9616932187c0fbcd30e25546e93869a8aad02aa1fc89fec52798445f1ce47208c5300779fa66dabc6eeb7bbc88c76f22c37aa99a4108b9b7f31f7ba5a9492396e03d9f1add1e7180172ac3a9d76da2c38d4cd1874837a263fff5ed95c08f0", 0x7f}], 0x3, &(0x7f0000001740)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x2c, 0x1, 0x1, [r1, r0, r1, r1, r1, r0, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, r1, r1]}}], 0x78, 0x4000000}, {&(0x7f00000017c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000002980)=[{&(0x7f0000001840)="f4", 0x1}, {&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="249c49bc88f0ac01b3c02ed1a1f95b0c0cec159665dca527b78a68bf9c2406b39be263ce549db85d11460d779c4d2e77518bf5ada032cc5f73edb0ca3153f2f0376fbfb8f015c757fb817cd776966afe66641521d5621e12cc3d581571f35a1f5f9e3b3e25f5c470413cc3c6db6f84be856895a425253145704fd02edffb3f", 0x7f}, {&(0x7f0000002900)="43aecf451cc0f49e778836ac60978862cbbfdc55fa72e1fff9efbd4a1b5f716556c6d0276bb61620d99b9376b7e74e2a3ed36e2f2ececb6be727b9f265a7ca68feb7755b4cb096ed7c2046b583ccf41f7f599a71d987ea3f36e28e98b578e3b4bb3f93981a40ea5d73e546ee217a8d64", 0x70}], 0x4, &(0x7f0000002c80)=[@rights={{0x1c, 0x1, 0x1, [r1, r0, r1]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @rights={{0x18, 0x1, 0x1, [r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0xb0, 0x4004}, {&(0x7f0000002d40)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000040c0)=[{&(0x7f0000002dc0)="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", 0x1000}, {&(0x7f0000003dc0)="e65888ff05cd1beafa5bf0f6f6b276ed820a111502df7391dcf941baac5c5576c4e8ac6331775dba89b2ff5e603f1d22663610c24dbc957f60ac38aaf0aeb598d1849f737e8ce355e7cc5a913e20bfd5261ce97f3dc550537f8d790fe402bb608b7dfaef4a06ca72f7f843009b1ee584f910dd51", 0x74}, {&(0x7f0000003e40)="663dda0089c871dafbe70c16be83551e7d0085e6d7f32fa5f92396ad00ac52f86b603b7aecf7a2bf517ef452c6b3abb3b25a7417894a685cb0ca6ec7403b1062b88dbc9d24fc7659d867e34fe82a662fe2f44c5a5df8e969d1", 0x59}, {&(0x7f0000003ec0)="19897f55771789a7fab0729180b9f29993135452fcc2077581fe2ef3a4015a6da92ebf688fa977406a699e3b39938f762a52ee4e2f651e9153953c4bfa517ca07e5ccc07ea35b15ce63beb5b2b2bafc5a10bdb18dfca87c4705200b693336112", 0x60}, {&(0x7f0000003f40)="2e72f4604418ba408fcfb3ebb3d672a5a579578d526f175defd314f4dc5f2f05d60a8828a085c59f525872e209c4682654d4b4232f7ecd673852e6b8131e0feb771526ac64bbb0e6fc5f3417d39081e23e1b256d1c25c6af8ea9ddf3102a7e6149ffac257d", 0x65}, {&(0x7f0000003fc0)="e6f4b9102a4b2752584f21afad175149d5c007e8a34efba11abded9785256ab65bd402d0a615c8d3391aad6ff44784f246e4c1afe78fa9bdb9ce1844d7ece02980a58d9551df32d210ae3c9774b5e28c58efb56acf3d8ff1b3c276b1ff2630623a684731076c490cfb316fcff5e4df804f0a16895184cf2a1a444b56adc16cc103cdd260ee4527072561eec7536bb59b6c94e2354f38b21260d2e83e80c96957d46c836706e8210cdcd12230ef778c194228599d1c9b5395e2ca1ff9f928f616d2d62c9cf3e12c4aefd16579", 0xcc}], 0x6, &(0x7f0000004440)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="000000697c5be15914f01967f88f664b5bfb0d19a7f952f64897522e095247db3abe1aec480740ae6f6cb96fa34d0c3d5ee311d3"], 0x40, 0x44000}], 0x6, 0x0)
bind$unix(r1, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x10}, 0x10)
prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ff9000/0x4000)=nil)
fstat(r0, &(0x7f0000000000))
r17 = getegid()
stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100))
lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0))
getgroups(0x6, &(0x7f0000000240)=[0x0, <r18=>0xee01, 0x0, 0xee00, 0xee00, 0xee01])
getresgid(&(0x7f0000001080), &(0x7f0000000340)=<r19=>0x0, &(0x7f0000001600))
getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440))
fstat(r0, &(0x7f0000000480))
r20 = getegid()
getgid()
getgroups(0x5, &(0x7f00000006c0)=[r18, r20, r17, r19, r18])

[  215.892922] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  215.912168] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  215.929363] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  215.935727] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  215.969529]  loop4: p1[EZD]
[  215.979749]  loop1: p1[EZD]
[  215.983592] loop4: p1 size 2047 extends beyond EOD, truncated
03:25:48 executing program 2:
r0 = syz_open_dev$vbi(0x0, 0x1, 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sysinfo(&(0x7f0000000000)=""/22)
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0)
r1 = socket$inet(0x10, 0x2, 0x0)
ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000080)={'vxcan1\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}})
stat(&(0x7f0000000140)='./file0\x00', 0x0)
ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000040))
setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000600)=0x629, 0x4)
fchown(0xffffffffffffffff, 0x0, 0x0)
sendmsg$sock(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="6dd46033520581a69d09f2cffd74efc76777b850aac6bc61166ab051e5c9db383653cdbd05ef03dfe678030b951e28da8ff7a15c155052e29cb50574d57689b64ddaa3f87d8b8e0fb1d9cdfc8bcd6bea549d56c94fd7d5697ba722ee61504319a9981be47d98d9677039306f27fc63772d2f157fcf6c8af05310dec72e6eecc7b330f4013561d70edb878ccdf89f2fdf58ea70cb5f1d713793e400f558f1cd5f230107a4a935ccb214f994e24d92ca640d9b6ac41551981ab7559bd251d38abb68686169822aaa9c059e907259fe11", 0xcf}, {&(0x7f00000002c0)="0164d0a3ec9881be6ba12f19adb0efc29e93c25626a7feced0ed066cdead8e2ae4257f556753d2109a0c9d11cde8afc920e367866e46b6917d9f253974d106e2153e6fb287b44aa119baf7bc49307e5da1fc5984c0ae36339a15e1c4e93d68a416d6b0e7cea2171732de2c54", 0x6c}, {&(0x7f0000000340)="3148b25e4d899db7dce96d38c895ecb6e5055e734fc285aa14dde7be1009aeb963bf82b7a431a823e2af17f1ee3a7084fb9c2462d8db25607d795513f7bb6978609cc46d1b82866e303470135d5e3484dcdfa757d45688646f1dc433e3e1c4b7222bc43bb6fc89e8e8d6396699af10f252fc20cda83904efd0b033b1f0a7147e131b1983a97f73d99daaec7bcabe30f5fd96", 0x92}, {&(0x7f0000000400)="41a0b92dcdf16f9ce8eabefc75589ba655d8105f82d7520f3f295fbaaf68f2dc0694882538186c13086bd0eae3c44986f99c7a8b7fa01c8a8a9e1669a963b5db1095eb457faf845671df5c7969853b1517bd2b677bde805715c830b381493af08744e1e4b835d6167a163a5e16ff4548d1f9bb367f4c9e5215ce803b46e25ec98439b2b6ca83595f9802c017185764f5f55f8f9ce4da5badd8712671b3694873054713d33395e0cd2671c452b8a21366b8c19e64880f743bd24b601abcb115c0fd1e3b74a50ae69c14ac0f27d45c33e5e40861326ba8919ece36610eec7a9b111f77310bd73889a9b258a80d377ab9a60faa3e1f3fd8", 0xf6}], 0x4, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffffffffffffc}}, @txtime={{0x18, 0x1, 0x3d, 0x91}}, @mark={{0x14, 0x1, 0x24, 0xffff}}], 0x48}, 0x80)
ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\x01', @ifru_flags})
ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1)
ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000680)={'irlan0\x00', {0x2, 0x4e22, @loopback}})
ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100))
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x8, 0x4)

03:25:48 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:48 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x940, 0x0)
write$cgroup_int(r1, &(0x7f0000000040), 0x12)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  216.066137] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  216.104716] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:48 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  216.149002]  loop5: p1[EZD]
03:25:48 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x401, 0x0)
getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000400)={<r2=>0x0, 0x54, "40c785d4d984f0e132c54306ce5d5a41a2bc0c553e4779da65d2695f08559799a4e6109e9573b951670fe38441124257d49523ecd62e15f6ee2849edd361d815488fa4c1395cd187b1fc3b796436840b869501ca"}, &(0x7f00000002c0)=0x5c)
getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000480)={r2, 0x1}, &(0x7f00000004c0)=0x8)

[  216.301597] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  216.351797] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  216.366407]  loop4: p1[EZD]
[  216.375189] loop4: p1 size 2047 extends beyond EOD, truncated
[  216.400543] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  216.409985] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  216.416406]  loop1: p1[EZD]
03:25:48 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = fcntl$getown(r0, 0x9)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=<r2=>0x0)
r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x142, 0x0)
kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3, r0, 0x1})
fcntl$lock(r0, 0x27, &(0x7f0000000100)={0x2, 0x3, 0x751, 0x9, r2})
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:48 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:48 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0xffffffff80000001], 0x100000})
sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa}, 0xc, 0x0}, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x10f002, 0x100a0})
syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1000, 0x181400)
ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000480)=""/167)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

03:25:48 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, <r1=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x80800)
setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@mcast1, r1}, 0x14)

03:25:48 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:48 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:48 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=<r1=>0x0)
process_vm_writev(r1, &(0x7f0000002440)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/234, 0xea}, {&(0x7f0000002340)=""/245, 0xf5}, {&(0x7f00000001c0)=""/83, 0x53}], 0x5, &(0x7f0000000040)=[{&(0x7f00000024c0)=""/248, 0xf8}, {&(0x7f00000025c0)=""/192, 0xc0}], 0x2, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  216.592010] *** Guest State ***
03:25:48 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80800)
accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x0)
r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7fffffff, 0x101000)
openat(r2, &(0x7f0000000040)='./file0\x00', 0x27daa0f2cb998a4d, 0x4)

[  216.615557] CR0: actual=0xffffffff9ffffffa, shadow=0xfffffffffffffffa, gh_mask=fffffffffffffff7
03:25:48 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  216.667014] CR4: actual=0x00000000000120e0, shadow=0x00000000000100a0, gh_mask=ffffffffffffe871
[  216.676432] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:48 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x402040, 0x0)
ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000180)=[0x9, 0x1])
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
futex(&(0x7f00000000c0)=0x2, 0x0, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)=0x1, 0x2)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0xffffff28)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381)

03:25:48 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x90041, 0x0)
write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x7}}, 0x18)

03:25:48 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nls={'nls', 0x3d, 'koi8-r'}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  216.710665] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  216.726145] CR3 = 0x000000000010f002
[  216.739219]  loop1: p1[EZD]
[  216.784249] PDPTR0 = 0x000000000e965001  PDPTR1 = 0x000000000e966001
[  216.794535] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  216.812508] PDPTR2 = 0x000000000e967001  PDPTR3 = 0x0000000001a3d001
[  216.823933] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:48 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  216.853800]  loop5: p1[EZD]
[  216.858178] RSP = 0x000000000000ffb6  RIP = 0x0000000000000003
03:25:49 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  216.900906] RFLAGS=0x00010013         DR7 = 0x0000000000000400
[  216.937528] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
[  216.948923] CS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  216.981857] DS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  216.990600] SS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  216.998664] ES:   sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000
[  217.009897] FS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  217.018547] GS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  217.020207] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  217.030281] GDTR:                           limit=0x00000000, base=0x0000000000000000
[  217.044223] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  217.057064] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  217.070568]  loop1: p1[EZD]
[  217.085185] IDTR:                           limit=0x00000000, base=0x0000000000000000
[  217.094040] TR:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  217.102207] EFER =     0x0000000000000000  PAT = 0x0007040600070406
[  217.108610] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
[  217.116216] Interruptibility = 00000000  ActivityState = 00000000
[  217.123168] *** Host State ***
[  217.126379] RIP = 0xffffffff81173b5f  RSP = 0xffff8880654e7998
[  217.133631] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  217.145645] FSBase=00007fd4d670d700 GSBase=ffff8880aef00000 TRBase=fffffe0000034000
[  217.153523] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000
[  217.153534] CR0=0000000080050033 CR3=000000009fe18000 CR4=00000000001426e0
[  217.153546] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff862018f0
[  217.153555] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  217.173424] *** Control State ***
[  217.182930] PinBased=0000003f CPUBased=b6986dfa SecondaryExec=000000e2
[  217.186662] EntryControls=0000d1ff ExitControls=002fefff
[  217.195266] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
[  217.202235] VMEntry: intr_info=8000030e errcode=00000000 ilen=00000000
[  217.202241] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001
[  217.202247]         reason=80000021 qualification=0000000000000000
[  217.202252] IDTVectoring: info=00000000 errcode=00000000
[  217.202256] TSC Offset = 0xffffff896c1e119d
[  217.202263] EPT pointer = 0x00000000a12a301e
[  217.202271] Virtual processor ID = 0x0001
[  217.240630] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  217.255065] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  217.261823]  loop5: p1[EZD]
03:25:49 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080))
r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58)
ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000140)=""/104)

03:25:49 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
eventfd2(0xfff, 0x800)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:49 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:49 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x12000)
getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4)

03:25:49 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:49 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:49 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:49 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2000, 0x0)
getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={<r2=>0x0, 0x58, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x1, @mcast1, 0x6}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x1, @remote, 0x7fff}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000140)=0x10)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0x1ff}, 0x8)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e24, 0x8000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x100, 0x10000, 0x80000001, 0x1c1, 0x5}, &(0x7f00000002c0)=0x98)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:49 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:49 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x181)
bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x3, @mcast1, 0x5}, 0x1c)
write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x4, {0x77f}}, 0x18)
accept$unix(r1, &(0x7f00000000c0), &(0x7f0000000040)=0x6e)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
recvmsg$kcm(r1, &(0x7f00000014c0)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000340)=""/137, 0x89}, {&(0x7f0000000240)=""/38, 0x26}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, &(0x7f0000001400)=""/165, 0xa5}, 0x1)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:49 executing program 0:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000dc0)={0xe, 0x6, 0x80, 0x7, 0xc4, "f55c05bd806b7be26d1f29f9a445f85a17bdb834e39ff6f24f60e7a8aee8f59f36b392ed943896de50e6cd9b135d546b04bd32830c48798cf5e76d5187b46fe87ef2e33c4b7bf4e8cec67e773e805d26e800b9e0df63b200ae06c29090239cdb5e52d01cd7bfa0fd51b3a3616d3591a7d097709c6b8e440d33f1b46f39faebc32ab97d5be5bd3eca119e5825094858137b6f02dc21f193aee525e21d9db80c1163554a3587921ccff25803a1c47fac6aa61673aa6aeaa1e56976b61bd64df71b7e580bcb"}, 0xd0)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000840)={<r2=>0x0, @in6={{0xa, 0x4e20, 0x5, @rand_addr="103fcbef487fd7b8fa2f04b912e4cc92", 0xffffffff}}, 0x6, 0x2, 0x0, 0x401, 0x9}, &(0x7f0000000900)=0x98)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000a80)={<r3=>0x0, 0x64, &(0x7f0000000c40)=[@in6={0xa, 0x4e20, 0x126, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10001}, @in6={0xa, 0x4e21, 0x7, @empty, 0x9}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}]}, &(0x7f0000000a00)=0x10)
connect$tipc(r0, &(0x7f0000000a40)=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x2, 0x4}}, 0x10)
sendmmsg$inet_sctp(r0, &(0x7f0000000ac0)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000007c0)=[{&(0x7f00000000c0)="e532c016fdb9d8bed5107fbaadda0c5d1314afc5b636eedc246b690281b7552e8386c32c8a9add0fa70bde6465aa9994321e69c720d96e12a7f0a461ffb5a806575fec4813979a3d16a9e29519d4865a21a039e5bfeb0dc890c950adb808c78468e8aee885344078311a2eb0a090e471b3ccf18dd192a1ae4a67d6218a2b876a8a0efc40241f2448b9c3bafe7c14e7de", 0x90}, {&(0x7f0000000180)="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", 0xff}, {&(0x7f00000002c0)="2e00a8a78b7d330242cdcf9375e8e7cbf311a5959aa33750081ffa8cdd12dd87bad1ce4672d39daf969bf5da", 0x2c}, {&(0x7f0000000340)="da1f54e3a89f6b0ce99ae9befe17e5799eb20d91673d4ad57d8f2a05c0214dcbee7be54632abe348d52a10df5e45396316dee035bb504c3097bda8613a26fd0400690d77bd869b132c7c99e614db4356d79ecf304384f17813f703fc1dc56486c16d808cf5fc023ca9a895d94fafbf66de22a8837da1bd4e6898f08dbf901a05a364e9e3ab75cdaa4c4f90b81a276c4ff65c4e1ac8706ee275f449ec42d551e1e63413c47e52f44393cf8cde8931304442357426c0c1370c415fb813ff44cfebadfc19e8d2eb974929cd00a24b8d714734e0531a3b0f5b1ab10c54c922f04e1adbc66b16518a209608889dee70cc5ba8", 0xf0}, {&(0x7f0000000440)="a16fe6475c3f178d87e33ac69811c73202e97422732d94084fc2cb7331827ccd9e4b7fc0f538710573ccfa570999c2fac655223cc6e9656de254bfc734084d7966989011f8b6f86653cf05363fe16556afa78e20fcb57df54b0de426619e3568a725cd538fc137d37a8305e93b16e4a77a8b81758444dea79acaa3e44738113cd3745da8436929783b2d1b50f154dcc8420c705b84038d94cf96cca992b7cbf4b55dce023b6b60945f079dbe313cb441b1e7d050b8ca803f56f3d497", 0xbc}, {&(0x7f0000000500)="e2fc556331f995fe1120c32e37b052cd6418d0ff05bd7edae7acda8dd659cf897ce59c33084328adcb673fcaff8effa7f34cd3ca4a30d3b81d6a04061daa70c9353e51e743e3c5d3fe1f59ffd9a23fd42d14d6fa6f52e6cf900e2a454de4a3528e4035cdf456df9dc12cfae827e573f6c63899657b2544aa340979d43e8337996ba252d3563e09b73501583da792281af20f003cc76101d5f3f230e2e3bdf9b2349d217b2ccf925172cf316dd50180f319104791d93d2aabf5d191687f88ed23760fb8d557f3136fe468bc186fd3c31e576e7e58a57d6d7909d680677f67cf3511849259a0f342acefce", 0xea}, {&(0x7f0000000600)="a9fcc543b23cf8e12fb70547a83a4af395d00be58536d84963afce7d5d1b575b59e70c77d8f9589fdaa22ad861cf839516d2fb50e1ba8d4e6d566f67a73df5927abdb96c285b69dd5493b965e68fac1af5eb4dc2bcbc42acc0241da55f4055e704de848eb391462bd6b351b187518a431bd8b4fbedd60d07b0b19ee28f53fa30fae1bd3a612bcc171d24e0400db96c2f5cc5c6110248f47f2d31997457f9c8ee194aa3b0bd2c72695ec7a6a5a5ceb3e57b6ae4bb62f5489807788e5dd62cf67bf4852bb51d1244ee59639ba0359ba59f58", 0xd1}, {&(0x7f0000000700)="6490088611ae2f1fc2cce872184be7e9cc31f59c415881523928834d78213d84f0ff8f505c76d4cdd9dcb6a660cc26e5b913b255567037f7fcb31cf46fdf646d687f8f88a3678b7fcaae2485097a77867007ab5d8d4257684800009f936a24dfeb36a29b08031a65057d2075e9f29b3e5d51151252fbeb3efe73e6874a46b26fc9f65ea549b527186d834ddd56aa2dfea98c", 0x92}], 0x8, &(0x7f0000000b40)=ANY=[@ANYBLOB="200000000000000084000000020000000300021000f9ffffffffffffffd78d5d4ffcd053b876e2ae628fb23582d570a945bec18ff18f31b77f66997a3bb69ce2ebad2641f84b9f0c923a1e86583c4922f4f34089b2b0a511baef86fd407388a3f831d5d72bf1aee57cc675cf27795349718bae44ce451c50e2713372", @ANYRES32=r2, @ANYBLOB="18000000000000008400000007000000e000000100000000200000000000000084000000020000002700080002000000faffffff", @ANYRES32=r3, @ANYBLOB="180000000000000084000000050000001000000003000000"], 0x70, 0x4000000}], 0x1, 0x4008010)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@initdev, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000940)=0xe8)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  217.590701] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  217.601306] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  217.623074]  loop5: p1[EZD]
[  217.631673] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:49 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
chroot(&(0x7f00000001c0)='./file0\x00')
mount(&(0x7f00000004c0)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x149000, 0x0)
chdir(&(0x7f0000000100)='./file0\x00')
symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00')
fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080))
umount2(&(0x7f0000000000)='./file0\x00', 0x2)
chdir(0x0)

03:25:49 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:49 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x1ff, 0x4)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  217.674950] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  217.708389]  loop1: p1[EZD]
03:25:49 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:49 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x882, 0x0)
setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000040)=0xffff, 0x4)

03:25:49 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:49 executing program 0:
r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x81, 0x1)
ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'ip_vti0\x00', 0x7})
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/252, 0xfc)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), 0x4)
setsockopt$inet_dccp_int(r0, 0x21, 0x1f, &(0x7f0000000100)=0x8001, 0x4)

03:25:49 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
sendmsg$sock(r0, &(0x7f0000000580)={&(0x7f0000000000)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)="faa7f7f7730a177c140cdfd9ac9ebcebf583d094f71c2f7710bcef55e6381921e13a70c5e00f2d75bf48aa6ad57a26aeb7247efe7d9f1764d91e91565c79b12373518224d074988e41423ab7ab7dadc5b387007638c49f7adfb09da0b679134c8565e52b68046d1645fa71296cde423f6279d93b4728969fcc4effff15ad56329d4f43f6608eeeb37e7509615d32659bcc517d4cf6b875706366a4a71eef534a5822fdd3df317a41ddc3c4ed7cc10011bc6d52", 0xb3}, {&(0x7f0000000180)="ad37aff57a271366d5d47c70aba3f8f94680640ff3cde3034ac3f3aa057edf5ec20df4a8716a0f61296baffbca87c013cd6a2660153b5103deaf2399a66c4bba14d3be8410bf41bf51954b8b33156badbeec4e65bd91b1180c2dbbb1ba17b8f1e394844c5d3950c1e46ec510b3fc28ae01de5556ae3dba3ff2e61151046bd8c952ab7eef1fe6a33bca529b9ef0b090fc5b2b05ad3f06ec5105d972403c7e72165d0df6d76d653fc65db5b2a1b0e9022c31956dc8efac21b212c801a1e3d7a2668f2d1a07f611d24f55c8ffe010357b930dd451e63ba1e209b8e930b97af9c0c99fdafcc6d1f75b3b88155008a42dd7df59de0fd852f9", 0xf6}, {&(0x7f0000000340)="87450cc10c25972392d2b5bfaa9c956356a382eab93c57ef38799befc3bbdd8a3ece136675ce97369ca05e82efaf2e1a77e0e0c8d9334afadaefe7f666f2ef1dff943e46f37d18fab54fc0b4a520300d8a890d1391f65d65685ab699f43713e3ee617d95779151757f31d7c3d3b8ab040dc245d05f8aec2ec6564fdf118382b4f7138a696d9c269a9f534c22d2f70efbf23c672aa572a79fd7fca17fc9948356efa265135892dab165dd05057b211105ff806938af888a937219d6b11a04fbb252388235a80631a442525d1ed5e43ad4f403", 0xd2}, {&(0x7f0000000440)="e7d0dc4e76c471cc8cf9fd0cec7edf8dd492f8e6f2e23d971b942c2b3bb3dd4a6d5957e01d367e7d7509003c9d507edcf1775a388eac78087270b357ed2a382a1193ae698d44df2b88ded4c5d07dbe32e2d3f6bb87789b04701110288e110ac603bd4ab411a9c0df2214c9e7c95d2dbe92a8ba5d40938f1455453a762191122625f75ad87813ae31662142caf7dbc53787a395145dd5deac5b0ce8605f0d218e71d8d1da8f24a5a6d6026ff7b7c8c3afbd4cf9226fc7b9ee72acee64f3dd1229806a90c0", 0xc4}], 0x4, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x18}, 0x0)

03:25:50 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x882, 0x0)
setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000040)=0xffff, 0x4)

03:25:50 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  217.972448] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  218.007380] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:50 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2)
ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xd)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0xc4db, 0x26}]}, 0x10)
getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8)

03:25:50 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x181)
bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x3, @mcast1, 0x5}, 0x1c)
write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x4, {0x77f}}, 0x18)
accept$unix(r1, &(0x7f00000000c0), &(0x7f0000000040)=0x6e)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
recvmsg$kcm(r1, &(0x7f00000014c0)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000340)=""/137, 0x89}, {&(0x7f0000000240)=""/38, 0x26}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, &(0x7f0000001400)=""/165, 0xa5}, 0x1)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  218.040994]  loop5: p1[EZD]
03:25:50 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  218.070899] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  218.096235] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:50 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  218.126760]  loop1: p1[EZD]
[  218.132277] Dev loop4: unable to read RDB block 1
[  218.148392]  loop4: unable to read partition table
03:25:50 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:50 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071")
r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x50d2, 0x400900)
bind$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x5, 0x85b5, 0x20, 0x7, 0x9, 0x6}}, 0x8)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='memory.swap.current\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000700)='tls\x00', 0x4)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000007c0)={@mcast2, 0x5, 0x1, 0x0, 0xb, 0x3800000000000, 0x6}, 0x20)
r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x0, 0x0)
inotify_add_watch(r3, &(0x7f0000000680)='./bus\x00', 0x80000420)
ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./bus\x00', 0x6, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0)
unshare(0x8000400)
futex(&(0x7f00000005c0)=0x2, 0x8f, 0x0, 0x0, 0x0, 0x0)
r5 = mq_open(&(0x7f0000000740)='mime_type\x00', 0x6e93ebbbcc0884f2, 0x4, 0x0)
bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendfile(r4, r5, &(0x7f0000000900), 0x7)

[  218.173598] loop4: partition table beyond EOD, truncated
03:25:50 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@barrier='barrier'}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:50 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = accept4(r0, &(0x7f0000000000)=@ipx, &(0x7f00000000c0)=0x80, 0x34596ddb55b0a80d)
ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000100))
setsockopt(r1, 0x4, 0xffffffffffffffff, &(0x7f0000000140)="7b5b3e95ab1508564b99abdc2e6f8a2fbefe9332e82ae9206d9f6c77315061cb664eb88b9cbd44d3bfb3dd4d3a8009220cc8017d5899bb8538", 0x39)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  218.220617] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:50 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:50 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x22040, 0x0)
ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x5, 0x7fffffff, &(0x7f0000000080)=0x7f})
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x10000020004e21, 0xffffffffffffffff, @mcast1, 0xeb6}, 0xe7)

03:25:50 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={<r2=>0x0, 0x0, 0x30}, &(0x7f00000000c0)=0xc)
getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x0, 0x4, 0x9}, &(0x7f0000000140)=0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
socket$unix(0x1, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  218.430881] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  218.450660] QAT: Invalid ioctl
[  218.455000] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  218.470797] QAT: Invalid ioctl
[  218.474361]  loop5: p1[EZD]
[  218.496819] loop5: p1 size 2047 extends beyond EOD, truncated
[  218.525546] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  218.535391] Dev loop4: unable to read RDB block 1
03:25:50 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x200002)
setsockopt$inet_dccp_int(r1, 0x21, 0x7, &(0x7f0000000040)=0x101, 0x4)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0xfffffffffffffdf8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, 0x1c)

[  218.543077]  loop4: unable to read partition table
03:25:50 executing program 2:
socket$can_bcm(0x1d, 0x2, 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0)
ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300))
readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, 0x0)
read$rfkill(r0, 0x0, 0x0)
connect$rds(0xffffffffffffffff, &(0x7f0000000000), 0x10)
mmap$binder(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0)
ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d)

03:25:50 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x2, 0x100)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x800, 0x0)
openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0)

[  218.574171] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  218.581860] loop4: partition table beyond EOD, truncated
03:25:50 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  218.625494]  loop1: p1[EZD]
[  218.631852] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:50 executing program 0:
syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x4000)
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e20, @rand_addr=0x4}], 0x10)
stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0))
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:50 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:50 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000380)={{0x1000, 0x2001, 0x8, 0x7, 0x3, 0x1, 0xfffffffffffffff9, 0x9, 0x5a38e6c0, 0x9, 0x9, 0x7}, {0x4000, 0xf000, 0xa, 0x2, 0x80000001, 0xff, 0x487d, 0x8, 0x5, 0xffff, 0x7adb, 0x15fcbdce}, {0x2, 0xf000, 0xd, 0x2, 0xd2, 0x200, 0x2, 0xfc, 0x401, 0x0, 0x2, 0x80}, {0x10004, 0x3000, 0xc, 0x3, 0x100000001, 0xfffffffffffffffe, 0x6, 0x1000, 0x80000001, 0xca64, 0x5, 0x9}, {0x106000, 0x4000, 0x9, 0x8, 0x9, 0xffffffff, 0xf2, 0x81, 0x200, 0x80, 0x401, 0x3}, {0x4000, 0x0, 0xb, 0x72, 0x6, 0x7, 0x7ff, 0x6, 0x9, 0x3, 0x6, 0x4}, {0x0, 0x5000, 0x0, 0x8001, 0x3, 0x5e, 0x9, 0x4, 0x3, 0x8, 0x4, 0x2}, {0x10000, 0x3000, 0xe, 0x5, 0xfc99, 0x4, 0x80000001, 0x0, 0x100, 0x8, 0x8, 0xd97}, {0x106004, 0x105000}, {0x10002, 0x2000}, 0x80040000, 0x0, 0x3000, 0x40050, 0xc, 0x0, 0x4, [0xffffffffffffff67, 0x38, 0x400, 0x3f]})
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x115000, 0x0)
ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000740)={0x0, 0x0, @ioapic})
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00')
sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)={0x198, r3, 0x611, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5c7e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x38a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x20000000}, 0x4)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r2, &(0x7f00000000c0)="b40ea7a4e260462c9f74cad3c4f0d514f50197d46dd47a1e104d0dd07bd0f8d88d6e4f63983b010682990bdccf3374679e88938390e17d02cc5a1c84f0a66445bbd291e610c85d4d6fac50e62d1178fcbd5f3f985e45edffbf34c04a3c959c0399ae093bef20ee08a426badbf43d7f2469a5a1b9f625f73613f540b2ad645e251f", &(0x7f0000000180)=""/212}, 0x18)
getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000840), 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @mcast1, 0x400000000004}, 0x1c)

[  218.693871] audit: type=1400 audit(1564716350.745:60): avc:  denied  { map } for  pid=10223 comm="syz-executor.2" path="/dev/audio" dev="devtmpfs" ino=15441 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1
03:25:50 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:50 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={<r1=>0x0, 0xae7, 0x30}, &(0x7f0000000040)=0xc)
getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r1, 0x1, 0x8001, 0x6}, &(0x7f0000000140)=0x10)
setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x400}, 0x8)

03:25:50 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @empty}], 0x10)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x8, @loopback}, 0x1c)

[  218.901440] Dev loop4: unable to read RDB block 1
[  218.908083]  loop4: unable to read partition table
[  218.913734] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  218.934098] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:51 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0x80000000, 0xffffffff, 0x60f3, 0x81, 0x8, 0x2})
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, <r2=>0x0}, &(0x7f0000000140)=0xc)
getresgid(&(0x7f0000000180)=<r3=>0x0, &(0x7f00000001c0), &(0x7f0000000200))
stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0})
lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0})
r6 = getgid()
getgroups(0x3, &(0x7f0000000440)=[0xee01, 0xee00, <r7=>0x0])
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, <r8=>0x0}, &(0x7f00000004c0)=0xc)
setgroups(0x7, &(0x7f0000000500)=[r2, r3, r4, r5, r6, r7, r8])
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getpeername$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x3f, 0x0, 0xffffffff, 0x1ff, 0x6, 0x1d, 0x91d, 0x4, 0x8001, 0x24, 0x80000000}, 0xb)

[  218.956596]  loop5: p1[EZD]
[  218.961550] loop4: partition table beyond EOD, truncated
[  218.971682] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
[  218.979137] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:51 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  219.005353] loop5: p1 size 2047 extends beyond EOD, truncated
[  219.021944] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:51 executing program 0:
r0 = shmget(0x3, 0x3000, 0x200, &(0x7f0000ffa000/0x3000)=nil)
shmctl$IPC_RMID(r0, 0x0)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @loopback}], 0x103ba)
setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x6}, 0x8)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0)
ioctl$KDSETLED(r2, 0x4b32, 0xce7)
r3 = geteuid()
setfsuid(r3)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e27, 0x0, @loopback}, 0x1c)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2001, 0x0)
getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.sockprotoname\x00', &(0x7f0000000380)=""/111, 0x6f)
getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8)
ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000440))

[  219.069880]  loop1: p1[EZD]
[  219.235093] Dev loop4: unable to read RDB block 1
[  219.244565]  loop4: unable to read partition table
[  219.254580] loop4: partition table beyond EOD, truncated
[  219.270174] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:51 executing program 2:
r0 = socket(0xa, 0x1, 0x0)
setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00p\x80\x00', 0x4}, 0xfffffffffffffe0d)
ioctl(r0, 0x8916, &(0x7f0000000000))
getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4)
ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040))
getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={<r1=>0x0, 0x19, "8f2add9c5612fa823387a5bcea8151e1a1179b0201cb3a7f5f"}, &(0x7f0000000140)=0x21)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000180)=r1, 0x4)
ioctl(r0, 0x8936, &(0x7f0000000000))

03:25:51 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:51 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@session={'session', 0x3d, 0x9}}, {@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:51 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={<r1=>r0})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000340)=[@in6={0xa, 0x4e20, 0x0, @local, 0x81}, @in6={0xa, 0x4e24, 0x0, @loopback, 0x9}, @in6={0xa, 0x4e21, 0x0, @mcast1, 0x1}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x7fffffff, @loopback, 0x9}], 0xffffffffffffff6b)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:51 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
socket$inet(0x2, 0x5, 0x100000000)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:51 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:51 executing program 0:
r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x81, 0x917e0de79abfa633)
ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x9e0000, 0x7, 0x8, [], &(0x7f00000000c0)={0x990a72, 0x100, [], @p_u16=&(0x7f0000000040)=0x2}})
getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={<r1=>0x0, 0x2e, "9d42c83514201856c8790e005ee7dcbe6c6926321659383415fa4e79ee0e83f9f0278c95a44d2cc6b0ab41e9a161"}, &(0x7f0000000180)=0x36)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="5d00000089e2e2a761339106301ed06d9a13286d5ec0276a297e4aa464fd5d8841ef6c19d1ca288a6179b65fe3af509783ced64a10fd230f8aea68a90653ba5a7717cad3f2158fc30534c8d29e65aec0f1a1a6d0a1df9399b71e51c2"], &(0x7f0000000240)=0x65)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r1, 0x6c32}, &(0x7f0000000340)=0x8)

03:25:51 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x7ffffffffffd)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:51 executing program 2:
r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0)
mmap(&(0x7f0000ab3000/0x1000)=nil, 0x1000, 0x1, 0x1001e, r0, 0xfffffffffffffffe)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000140)=0xc)
getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000001c0)=0x1c)
bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r2, 0x0)
sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c)
getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200), 0x10)
syz_init_net_socket$ax25(0x3, 0x3, 0xc7)
setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6)
setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28)
sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618)
bind$bt_rfcomm(r0, &(0x7f0000000280)={0x1f, {0x9, 0x3ff, 0x4, 0x5, 0x100000001, 0x6}, 0x6}, 0xa)

03:25:51 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  219.550678] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  219.561531] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  219.586496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  219.597040] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  219.616737] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  219.626678]  loop5: p1[EZD]
[  219.644872] loop5: p1 size 2047 extends beyond EOD, truncated
03:25:51 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2040, 0x0)
ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000040))
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  219.652466]  loop1: p1[EZD]
03:25:51 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040))
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:51 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:51 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  219.781380] Dev loop4: unable to read RDB block 1
[  219.786703]  loop4: unable to read partition table
03:25:51 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x795283, 0x0)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={<r2=>0x0, 0x9}, &(0x7f00000000c0)=0x8)
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x41}, &(0x7f0000000140)=0x8)

03:25:51 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000000c0)={0x4, 0x1c, [0x100000000, 0x4, 0x7ff, 0x9, 0x7, 0x5, 0x4]})
r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0)
ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0xe1f, 0xffffffffffffffff, @rand_addr="0dbb11aff53d190188391b35c44a1290"}, 0x1c)

[  219.828130] loop4: partition table beyond EOD, truncated
[  219.863154] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:52 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:52 executing program 3:
r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x301000)
ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000180)={@mcast2})
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x800, 0x4000)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0)=0x9, 0x4)

[  220.074979] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  220.101951] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:52 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x20000000000)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1403e60ac66c89a7, 0x0)
write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffff5, 0x2}, 0x10)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  220.123924] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  220.137147]  loop5: p1[EZD]
[  220.151908] Dev loop4: unable to read RDB block 1
[  220.162657]  loop4: unable to read partition table
[  220.164732] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  220.176883] loop4: partition table beyond EOD, truncated
[  220.184441] loop5: p1 size 2047 extends beyond EOD, truncated
[  220.194609] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
[  220.204340]  loop1: p1[EZD]
03:25:52 executing program 3:
r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xc4)
ioctl$TCGETX(r0, 0x5432, &(0x7f0000000000))
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  220.345830] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
03:25:52 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x795283, 0x0)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={<r2=>0x0, 0x9}, &(0x7f00000000c0)=0x8)
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x41}, &(0x7f0000000140)=0x8)

03:25:52 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:52 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:52 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:52 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={<r1=>0x0, @in={{0x2, 0x4e22, @remote}}, 0x80000000, 0x8, 0x8, 0x15, 0x3}, &(0x7f0000000000)=0x98)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={r1, 0x1000, 0x3, [0xffffffff, 0xe56, 0x9]}, &(0x7f0000000180)=0xe)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:52 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
socket$vsock_dgram(0x28, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:52 executing program 2:
r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x81, 0x917e0de79abfa633)
ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x9e0000, 0x7, 0x8, [], &(0x7f00000000c0)={0x990a72, 0x100, [], @p_u16=&(0x7f0000000040)=0x2}})
getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={<r1=>0x0, 0x2e, "9d42c83514201856c8790e005ee7dcbe6c6926321659383415fa4e79ee0e83f9f0278c95a44d2cc6b0ab41e9a161"}, &(0x7f0000000180)=0x36)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="5d00000089e2e2a761339106301ed06d9a13286d5ec0276a297e4aa464fd5d8841ef6c19d1ca288a6179b65fe3af509783ced64a10fd230f8aea68a90653ba5a7717cad3f2158fc30534c8d29e65aec0f1a1a6d0a1df9399b71e51c2"], &(0x7f0000000240)=0x65)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r1, 0x6c32}, &(0x7f0000000340)=0x8)

[  220.610620] Dev loop4: unable to read RDB block 1
[  220.615681]  loop4: unable to read partition table
[  220.656608] loop4: partition table beyond EOD, truncated
[  220.678254] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:52 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x80800, 0x0)
ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000180)={0x2})
rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0)
write$selinux_context(r2, &(0x7f00000001c0)='system_u:object_r:qemu_device_t:s0\x00', 0x23)
write$P9_RWRITE(r2, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x4}, 0xb)
syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x6, 0x20000)

03:25:52 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x2, [0x1ff, 0x1]}, &(0x7f0000000040)=0x8)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:52 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x3a6)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0)
mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x1, 0x100132, 0xffffffffffffffff, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x11a, 0x1, 0x0, &(0x7f0000000180))
r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2)
ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000200)={{0x5, @addr=0x100000000}, "4e4e7db88f468acb13c2781ebe5196ce75429ecab8c94012a00003a66f18506e", 0x2})

[  220.731049] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  220.732415] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  220.744972] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  220.756221]  loop5: p1[EZD]
[  220.759409] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  220.759803] loop5: p1 size 2047 extends beyond EOD, truncated
03:25:52 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  220.797247]  loop1: p1[EZD]
03:25:52 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:52 executing program 2:
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000001980)='/dev/audio\x00', 0x0, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000000)={0x4004, 0x105000})
fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:crond_exec_t:s0\x00', 0x22, 0x3)

[  220.829161] audit: type=1400 audit(1564716352.875:61): avc:  denied  { map } for  pid=10464 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=37728 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1
[  220.959498] audit: type=1400 audit(1564716352.995:62): avc:  denied  { associate } for  pid=10483 comm="syz-executor.2" name="audio" dev="devtmpfs" ino=15441 scontext=system_u:object_r:crond_exec_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1
03:25:53 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:53 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e)
shutdown(r0, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x3, 0x5, 0x8000, 0x6, 0x8, 0x3, 0xb4, 0x100000000}, &(0x7f0000000100)=0x20)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x8a00, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x160f, @dev={0xfe, 0x80, [], 0x18}}], 0x1c)
setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000200)=0x29a1df70, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:53 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0xffffff88)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:53 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:53 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8012, r1, 0x0)
mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r1, 0x0)
r2 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, r1, 0xb)
mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x16c, r3, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x76b}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd165}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x78}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9955}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)

03:25:53 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$RTC_AIE_ON(r1, 0x7001)
setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  221.131902] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  221.152867] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  221.187868]  loop5: p1[EZD]
03:25:53 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20002, 0x0)
accept4$bt_l2cap(r1, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x80000)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:53 executing program 2:
r0 = socket(0x40000000015, 0x805, 0x8000000000000)
r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="b933000661647e4957571c250cc636d9dcee3f0143fd470a0b60313612a9f9ef8adb3dc5a48f24ce78af1685a461ba045b0a44d1955add83f6eea498dabcdf21b78416b57218864be13b840a05f784199510acd57d98afc8093c0dcd38175e2b6cf877422fb2a47eb5c353d9ab28607f76a42c34d92f0039cf8d5790aecf653a009e4a08b6baa1455ead111485f2dd6fef04f1e091d6a0a8edc6d044b3c30111f2f66d287390917c81aa9a73d519c51ca37b49e1964f061f4f0fc2c10e8bb68b7b8b78835495f87297248fe8237a28e756ba5db3849b5c6a891aedd20ac2e981cfd77425c69a60feff55cbf4ab248e61", @ANYRES16=r1, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x11}, 0x20000000)
getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000040))
r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x220100, 0x0)
ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000080)={0x8, 0x8, 0x0, 0x4})
setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86)

[  221.210956] loop5: p1 size 2047 extends beyond EOD, truncated
[  221.250732] Dev loop4: unable to read RDB block 1
[  221.255908]  loop4: unable to read partition table
03:25:53 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2)
getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={<r2=>0x0, 0x7}, &(0x7f00000000c0)=0x8)
getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x0, 0x5, 0x9, 0x8000, 0x1}, &(0x7f0000000140)=0x14)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:53 executing program 2:
r0 = getpgrp(0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x3f)
ptrace$cont(0x18, r1, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2000000, 0x3, 0xfc})
ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080))
ptrace$setregs(0xf, r1, 0x554, &(0x7f0000000140)="9595b6a260d2ad39a1c1b90bfeba83baa78d556dc9ffbd040ffdff910002cf33c7530125c1a323e0741be5c392260c986dfc1aa4a493fa3635454bcf251d03f6c99dfcc1e7e69d2d63e9d6408bc2a53c1f17f16cd2ea7f5d2b0a06b4ac0af78e249e4b2bef16ccd03b831d7bdf5a3c15b8131d75326d381b93ade49d005fe08a773a874833e1844ce45449a1dbc7065465a499291821f840e1d18b41fb68af9e600d2d771fe696a2a7af9a5922bfde41002fe369f154ecaaf83ef7afb8dbf775157200732e2d4eb184ce8b3c3d9d0f68cd8089fd5ae04ef11943e26d6816687a35976ba7")
ptrace$cont(0x9, r1, 0x0, 0x0)

[  221.288967] loop4: partition table beyond EOD, truncated
[  221.305255] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  221.308076] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:53 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:53 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0xfffffffffdfffff9)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x28e)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = fcntl$getown(r0, 0x9)
ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  221.348724] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  221.387246]  loop1: p1[EZD]
03:25:53 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:53 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x400, 0x100)
ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000040))
connect$ax25(r1, &(0x7f0000000180)={{0x3, @bcast, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @bcast, @null, @null]}, 0x48)
getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f0000000200)=0x8)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
ioctl$void(r1, 0x0)
getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, <r2=>0x0}, &(0x7f0000000100)=0x14)
ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000140)={r2, 0x100000000, 0x4, 0x8001, 0x1, 0x5, 0x2})

03:25:53 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0xd77c, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = dup(r0)
ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0))
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000040)={0x2, 0x40})

03:25:53 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x10000001, 0x84)
r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3ff, 0x43)
ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000040))
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x7}, 0x8)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:53 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@context={'context', 0x3d, 'staff_u'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:53 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = getpgrp(0x0)
r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0)
setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4)
ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000000)={0x6})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffffffffffc}, 0x1c)
splice(r2, &(0x7f0000000100), r2, &(0x7f0000000140), 0x6a0, 0x5)

[  221.611486] Dev loop4: unable to read RDB block 1
[  221.617012]  loop4: unable to read partition table
[  221.641266] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:53 executing program 2:
r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20002, 0x5)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=<r1=>0x0)
sched_getaffinity(r1, 0x8, &(0x7f0000000080))
r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x100, 0x0)
fanotify_mark(r2, 0x40, 0x40000000, r0, &(0x7f0000000100)='./file0\x00')
ioctl$BLKTRACESTOP(r2, 0x1275, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68)
sendmsg$nl_generic(r2, &(0x7f0000001300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000000240)={0x106c, 0x33, 0x800, 0x70bd25, 0x25dfdbff, {0x9}, [@generic="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", @typed={0x4, 0x12}, @generic="baee57bfb1e0d352b27eb7840b9fc0daced0e2189e5a5fbf0741d0450d56380fa95d738a43a81871d147ae848e03530d07809530b661e545527910421b499d5f09eccf4b7f1accc6f138e36eb1e7120087d408c4"]}, 0x106c}, 0x1, 0x0, 0x0, 0x4000}, 0x10)
ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000001340)=0x8001)
getrlimit(0x7, &(0x7f0000001380))
r3 = socket$key(0xf, 0x3, 0x2)
mkdirat$cgroup(r2, &(0x7f00000013c0)='syz0\x00', 0x1ff)
ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000001400)={0x8, 0x1, 'client0\x00', 0xffffffff80000000, "679c23f7fe1d4a8f", "09079dfce55110fe711594de6e0db264d8adc04b063373e12f4b6d7ec8dbdb9c", 0x6, 0x80000001})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000014c0)={{0xffffffffffffffff, 0x1, 0x1, 0x2, 0x3}})
setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001500)={'filter\x00', 0x4}, 0x68)
ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000001580)=0x60)
pipe(&(0x7f00000015c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_aout(r2, &(0x7f0000001600)={{0x10f, 0x40, 0x760a9fd6, 0x140, 0xe8, 0x800, 0x3a, 0x80}, "26503c893b02df6e056be0851e75d4ec5ae47fe0dc45eda9784c2395a34589c910ccd2694f0285f746afb46b730b73d3f035189ef4798f072bd33be776cfe827989fb6ca6dafd1475800c2c1e432b9269f19487ebe9500d1db86f56162d5de1d33255f347fa6789821bbf764e51887a29c5b17bb4cd384115c094a73b366b5151b9e", [[]]}, 0x1a2)
statx(r4, &(0x7f00000017c0)='./file0\x00', 0x0, 0x813, &(0x7f0000001800))
ioctl$DRM_IOCTL_ADD_BUFS(r4, 0xc0206416, &(0x7f0000001900)={0x3f, 0xffffffffffffffff, 0x8000, 0xdc6c, 0x10})
ftruncate(r0, 0x3)
ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000001940)=0x6)
r6 = eventfd(0x4)
ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f0000001980)={0x3, 0x18, [0xa87, 0xfffffffffffffffb, 0x80000001, 0xffffffff, 0x401, 0x4]})
ioctl$KVM_GET_EMULATED_CPUID(r4, 0xc008ae09, &(0x7f00000019c0)=""/38)
ioctl$VT_GETSTATE(r5, 0x5603, &(0x7f0000001a00)={0x0, 0x4, 0x5})
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000001a40)={0x1, r6})
getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000001a80)={'raw\x00'}, &(0x7f0000001b00)=0x54)
ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000001d00)={'vcan0\x00', <r7=>0x0})
sendmsg$nl_route_sched(r2, &(0x7f0000003100)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x20800110}, 0xc, &(0x7f00000030c0)={&(0x7f0000001d40)=@newtaction={0x135c, 0x30, 0x214, 0x70bd2c, 0x25dfdbfb, {}, [{0x1078, 0x1, @m_ipt={0x1074, 0xd, {{0x8, 0x1, 'ipt\x00'}, {0x60, 0x2, [@TCA_IPT_INDEX={0x8, 0x3, 0xe95}, @TCA_IPT_TABLE={0x14, 0x1, 'raw\x00'}, @TCA_IPT_TABLE={0x14, 0x1, 'security\x00'}, @TCA_IPT_TABLE={0x14, 0x1, 'security\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_HOOK={0x8, 0x2, 0x5}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}]}, {0x1004, 0x6, "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"}}}}, {0xa0, 0x1, @m_skbedit={0x9c, 0x13, {{0xc, 0x1, 'skbedit\x00'}, {0x44, 0x2, [@TCA_SKBEDIT_MARK={0x8}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x20, 0x1ff, 0x4, 0x400, 0xfffffffffffffffd}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x3, 0x2, 0x20000000, 0x6, 0x6}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x3}]}, {0x44, 0x6, "e94e4fbb99cc483d7b324df22f379220404b7fd756c175ebef18af3a79663af4ff0e2511bd79b08ca21788aa65cda3b1c7d7a0aa1e8594d03ceb73f088b9c9"}}}}, {0x68, 0x1, @m_connmark={0x64, 0x18, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x401, 0x10000000, 0x99, 0xfffffffffffffff9}, 0x7dd4}}}, {0x2c, 0x6, "98a54fc9e51bed4d6cf5fb2946db5d4b73ee999d22613aab12d43b93ca1e7cea25bba96c90ec"}}}}, {0x100, 0x1, @m_ipt={0xfc, 0xd, {{0x8, 0x1, 'ipt\x00'}, {0x20, 0x2, [@TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x14, 0x1, 'security\x00'}]}, {0xcc, 0x6, "f51fec48f171b7475f6c6fe5e85d167b57f88686af37abcfdbf606d98066a933dd1ecc7bb24147c62f05fdbcaa5e0bcd40fac688e84c15521e0355db84cea0438c8ffb78a96a252c8aa84322e330943170904e63734c94075331f0a083eadf212166e173c1d8f94e5e2bb8d739a94ac612aacd4e97fd2a303ecc8e587b567c46ba3a07821452c070d3a53b2394ea0b490c812c8d8f1c75af798904a8ec8037efe157b2aa0d55797ee5b7ef4f54e67c5397cd7da93d330a796033bb93c0451c68065f68113c42"}}}}, {0xc8, 0x1, @m_mirred={0xc4, 0x6, {{0xc, 0x1, 'mirred\x00'}, {0x24, 0x2, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x2, 0x1, 0x3, 0xe5ab, 0x1}, 0x3, r7}}}, {0x8c, 0x6, "e988dde0e7b75bca2a4bd65478a7526992ec4602ed9640d82f5687cf65d207e6d478b452f2783aa0a9fa7319c037643c2f32102980ed4370d67b5e12c333f6be58b83d090752e3e70a1e2288e3269bf9321f2ce7b764783b033eee428268459da88c3f75e373a7609af8526511d6139d05fc246cf562012b6c70ee82c928e68c3575e47117779a"}}}}]}, 0x135c}, 0x1, 0x0, 0x0, 0x20040080}, 0x0)

03:25:53 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x480040, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  221.657508] loop4: partition table beyond EOD, truncated
[  221.672179] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  221.688330] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
[  221.703218]  loop5: p1[EZD]
[  221.719886] loop5: p1 size 2047 extends beyond EOD, truncated
[  221.750852] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:53 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:53 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = socket(0x1f, 0x0, 0x7)
r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
bind$isdn_base(r1, &(0x7f0000000100)={0x22, 0x3, 0xffffffff00000000, 0x2, 0x4a2a}, 0x6)
fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, <r3=>0x0})
sched_getaffinity(r3, 0x8, &(0x7f00000000c0))

[  221.769333] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:53 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840))
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:53 executing program 2:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x7c)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000000380)='./file0\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r2 = getpid()
sched_setattr(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x3}, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
creat(&(0x7f0000000340)='./file1\x00', 0xffffffffffffffff)
fanotify_init(0x8, 0x7fffc)
getegid()
getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0)
getgroups(0x4, &(0x7f0000000280)=[<r3=>0xee00, 0xee01, 0xee01, 0x0])
setresgid(r3, 0x0, 0x0)
r4 = getegid()
r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0)
ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f0000000040)={0x3f, 0x6})
setgroups(0x1, &(0x7f00000001c0)=[r4])
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
dup(0xffffffffffffffff)
ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000080))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setscheduler(0x0, 0x2, 0x0)
write$cgroup_subtree(r7, &(0x7f00000003c0)=ANY=[@ANYBLOB="d8bd07e52664f3d61e64c66165ceefac7b8e5dfcea92d6d5d2f204b8b38c9165d624cc741bc839d5837c2d6a634b2f53e21589ac84bacf834038e1ab878375774f7aa9863a88400c1ff6f06fecba22af867fbbfa3f504235787f7cc3270239d8496605399a9dfe425cea3c049ebc69dd2555a886c43f65d619969ef0866ff0fa84e0a7ac51cf934caf0679da117cd9d12603e302e859fcbe61ef"], 0x17)
ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000180))
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff)
sendto$ax25(0xffffffffffffffff, &(0x7f0000000100)="398908b5976122ac92ac04e8564ff6372d8cb9759316e0fac85ca5f5d937a202afcdcc22f06fb5ca0ab205aae8712be1ec4ded2e729e", 0x36, 0x40000, 0x0, 0x0)

[  221.820137]  loop1: p1[EZD]
03:25:53 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000040)=[{0x5, 0x8, 0x4, 0xd7}, {0x4, 0x9, 0x8c3, 0x2}, {0x5, 0x8, 0x9, 0x2}, {0x1, 0x3f, 0x9, 0x2c}]}, 0x54)
r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x100000001, 0x40100)
setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000100)=0x7, 0x4)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:53 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}, {@pcr={'pcr', 0x3d, 0x35}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:54 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2)
setsockopt$SO_TIMESTAMP(r1, 0x1, 0x7f, &(0x7f00000000c0)=0xb63, 0x4)
setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x7, 0x36d)

[  221.950915] Dev loop4: unable to read RDB block 1
[  221.955972]  loop4: unable to read partition table
03:25:54 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x42080, 0x0)
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0)
renameat2(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  222.049135] loop4: partition table beyond EOD, truncated
[  222.060999] ldm_validate_privheads(): Disk read failed.
[  222.066442]  loop5: p1[EZD]
[  222.069385] loop5: partition table partially beyond EOD, truncated
[  222.097276] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:54 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  222.141945] loop5: p1 start 1 is beyond EOD, truncated
03:25:54 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:54 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = syz_open_dev$vcsn(&(0x7f0000000a80)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x4000)
ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xc)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
write$P9_RCLUNK(r2, &(0x7f0000000a40)={0x7, 0x79, 0x1}, 0x7)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000ac0)={0x79, 0x0, [0x1, 0x2de6, 0x9, 0x8001]})
r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000880)={<r4=>0x0, @in={{0x2, 0x4e23, @rand_addr=0xbf4}}, 0x20, 0x6}, &(0x7f00000002c0)=0x90)
sendmsg$inet_sctp(r3, &(0x7f0000000a00)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x8000}, 0x1c, &(0x7f0000000800)=[{&(0x7f00000000c0)="cbca6d381c993a1503d93142741224e97fd8022121b223b313c0ce88e3ea104852bab8e9009464f81a83a46058c6d26816b4d091b2dfe263e0041f156c66520b7a73dc0b5ef2b94b8143e3d167d2d888049670cf3aaea546e7da6448bc30f8d4649d8a54e6d8b2b818d508ec15d860f4bc39c045ea0b968698ff9330a4c0cfc074f476f398e1c60368f9d83026f1218b81ddc8610282013f8a0257313ad3028c0ac6ce21b22f060da078d68a13fd33fc94e9489c885fd18330a4a2108ec9bafce9c325c9884305d0890d555beb17459c35", 0xd1}, {&(0x7f00000001c0)="6652164dc7940a9d14a1d20d56e4fd80dc328b47986cda09a00fe8b4b3a02f5a80b008242e77843baa5c775624fe57902ed4b2459af50cef3f9354f3b7fb755ddafbc84b54f0aaaccb25fa20c27d8a849453", 0x52}, {&(0x7f0000000340)="13f4e3bc41cf21ee92733db12cec32e6cd9c8167e80a49b5bb72b4cf1e1b53234757a14c38a7d596cc02940a637585c1b10800b7375028520b825ea8db313eefdde87c21c4a339f55b6c58188f82e6b586bfa39df8c364e16f664076f9ed6f568cfaf2353ce2025e705b69da5d5ad15ff7de5880959a0ef619d8ae0627d1586fdc5d761b7e480166897098b29548513b0213ec6465aca339064db348cc1da782853cc65e31468be06f4ded67df6cb1ac389ce8a108233709dca3b904c94618fd25553c93dabdb1181a7be7d9211f28f8ebd4fa6e3ec4084ac2369315f6a46df179c81e39f6f48735145ee845c4a9b715baccab", 0xf3}, {&(0x7f0000000440)="3d28148d072cb10cc42b8a247e1e65eb5cb3bddac5fb08b423b63702717bc77287ebf021b2f047c72eb0084ffbdec08d385797efd50ca09d0337264c4ce1770973a003051f2e4579785ff3f37c12dc20cf01552ca311cb8f44febe65cc67310df6f3ae456ded7d889c6a5ae7186a7061d918b201191f595dcd7475a1675988485c753a7cb95c93a8db1543c9452a591d9ea567e8125cab6db832d42419a61452ad9ef0de5770654d602744ee28c5c45a68dcfa4c37bedf53b6a615b6e1862df1bb7f5662e5cf2ee2d4aa8468c2d9c393a414d23da53c0609d11a5556900f9566c777e63b2d16df2ebfa0ce75e7f8a23b58f1935fbef2e67ad5", 0xf9}, {&(0x7f0000000540)="57e8f3f3dd4b5adee62b4a9432c56b16b7c23d1c2e9a0467f45942fed45836273820f1734140b03db7f886504c8f9040a280647b25271a4aa262f86bf6a53444f9585616b236ae271eaabee537f944168cdf366bc16e1561df1af790ce690a9fbea20cfce34c8cd9c1f749838258f2a1220d3752fb8967ecf699d9af6e6a06dc4f0075b917948b66d0", 0x89}, {&(0x7f0000000240)}, {&(0x7f0000000600)="16ed9f005ede2978cf861dd1196a8c1e43817c7b816fa927c590ee8de95d961b5145de4a4d48090b49f7e6f34b03e7e6e88c2188293cd8433ac231ab4fa942a108eb1d692f4f2bdbc03c42290042cc88dde85773d18abeec8143cd0d5e79ad78cb720e5796cd51e87feec25e316ac2b4bbda4da445755e3e46a78a108efd5a4f5be7882f7fd34d984846c598fb416b6153b8c0e674260a3dbd6bbda05afcf9ad72bb13dda28c5bbb9817d817af4837638bafe1456dc6e75ead5f9807665d6f6e537df04cdd4cc694966ce254", 0xcc}, {&(0x7f0000000700)="c6f00e0cd97493d6fc1c8d9127bbbc588d88be248d69afa12751d5c9ab6d39b95a641de97fbe3eebaa19dc3e60086076b902ba0f8ead10ae84617371d43ee4a66118f865a973ffe22e97fdcc974a795d809a555d9d4a83c4d6cbd65b7dd2e81bfce7b876eb4041f64e7837746e90b65dceff52fc836142eed95c5a1c8e79c41ee408617465c6a58aa7951cd0eb04158595cd0841751276f1a6fedeee3ac6914dd1927186610535be303fef5310bf58afb0dd809fa80d226faa760587ddc634121031e1157aeafe2ab07e1774a86ca5c6d3242d7b538b89f948e2f972c6717551503d815179a51a7397e8aff607d75016ad4b", 0xf2}], 0x8, &(0x7f0000000940)=[@authinfo={0x18, 0x84, 0x6, {0x24}}, @init={0x18, 0x84, 0x0, {0x8, 0x5, 0x3, 0x7}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="b34b29080e983df076cf90fb13f280c5"}, @sndrcv={0x30, 0x84, 0x1, {0x20, 0x2, 0x1, 0x1, 0x800, 0xffffffffffff0001, 0x3, 0x67, r4}}, @authinfo={0x18, 0x84, 0x6, {0xffffffff80000000}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}], 0xb0, 0x4000000}, 0x20004090)

03:25:54 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840))
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  222.232277] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  222.260121] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:54 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x4, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  222.290447]  loop1: p1[EZD]
03:25:54 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10040, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000040)}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:54 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  222.394873] Dev loop4: unable to read RDB block 1
[  222.399857]  loop4: unable to read partition table
[  222.434980] loop4: partition table beyond EOD, truncated
[  222.468181] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
[  222.530955] ldm_validate_privheads(): Disk read failed.
[  222.537028]  loop5: p1[EZD]
[  222.565603] loop5: partition table partially beyond EOD, truncated
[  222.614963] loop5: p1 start 1 is beyond EOD, truncated
03:25:54 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:54 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:54 executing program 0:
r0 = fanotify_init(0x34, 0x101000)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x208201)
fsetxattr$security_smack_entry(r0, &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='selinux)\x00', 0x9, 0x3)
ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000640))
fanotify_mark(r0, 0xf5, 0x9, r1, &(0x7f0000000040)='./file0\x00')
accept$inet6(r1, 0x0, &(0x7f00000005c0))
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000600)={0x0, &(0x7f0000000280)}, 0x10)
fadvise64(r0, 0x31, 0x3, 0x3)
getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000140)=0xffffffffffffffc6)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000580)=0x7)
fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x4)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
ioctl$UI_DEV_CREATE(r1, 0x5501)

03:25:54 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840))
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  222.681961] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  222.704628] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  222.718645]  loop1: p1[EZD]
03:25:54 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{0xffff0000, 0x0, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x0, 0xfffffffffffffffd}, {}, {}, {}, {}, 0x4})
r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0)
ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000040)={0x40000001, 0x8, 0x1e})

03:25:54 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}, {@obj_user={'obj_user', 0x3d, '*GPLem1bdevvmnet17\\m*]'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:54 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0)
write$P9_RLERROR(r1, &(0x7f0000000040)={0x2b, 0x7, 0x2, {0x22, 'bdw\xcdtrusted\x8drutedsecurity)eth0ppp1'}}, 0x2b)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:54 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x0, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
rt_sigsuspend(&(0x7f00000000c0)={0x80000001}, 0x8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e27, 0xfffffffffffffffc, @loopback, 0xfffffffffffffffe}, 0x1c)
r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0)
write$apparmor_current(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='permprofile securityvboxnet0(ppp0%%cpusetmiae_type#\x00'], 0x1)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4)

[  222.881939] Dev loop4: unable to read RDB block 1
[  222.887891]  loop4: unable to read partition table
[  222.944847] loop4: partition table beyond EOD, truncated
[  222.981461] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:55 executing program 2:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="a98fb691076ab6664db66e53f924000045a7de154f0700df00"], 0x19)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
truncate(&(0x7f0000000180)='./bus\x00', 0x9)
unlink(&(0x7f0000000340)='./bus\x00')
sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe)
signalfd(r0, &(0x7f0000000040)={0x713}, 0x8)
mkdir(&(0x7f00000001c0)='./bus\x00', 0xfffffffffffffffe)

03:25:55 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x377, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
fcntl$getflags(r0, 0x403)

[  223.051041] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:55 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  223.101893] ldm_validate_privheads(): Disk read failed.
[  223.107774]  loop5: p1[EZD]
[  223.120605] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:55 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0)
ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x6, 0xfff, 0x81, 0x5, 0x51e})

[  223.146802] loop5: partition table partially beyond EOD, truncated
[  223.167853]  loop1: p1[EZD]
03:25:55 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r1=>0xffffffffffffffff})
write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  223.198033] loop5: p1 start 1 is beyond EOD, truncated
[  223.203598] QAT: Invalid ioctl
[  223.228402] QAT: Invalid ioctl
03:25:55 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:55 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@smackfsroot={'smackfsroot'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  223.290784] Dev loop4: unable to read RDB block 1
[  223.295708]  loop4: unable to read partition table
[  223.295765] loop4: partition table beyond EOD, truncated
[  223.315769] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:55 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0)
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00')
sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x32, r2, 0x705, 0x70bd29, 0x25dfdbfc}, 0xa8}, 0x1, 0x0, 0x0, 0x40}, 0x800)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:55 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:55 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x480, 0x0)
getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  223.551973] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  223.562255] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  223.572942] Dev loop4: unable to read RDB block 1
[  223.578185]  loop4: unable to read partition table
[  223.589602] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  223.596295] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  223.602639] loop4: partition table beyond EOD, truncated
[  223.608572]  loop1: p1[EZD]
[  223.611943]  loop5: p1[EZD]
[  223.615200] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
[  223.624508] loop5: p1 size 2047 extends beyond EOD, truncated
03:25:55 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x3c, &(0x7f0000000280)}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c)

03:25:55 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0)
accept(r0, &(0x7f0000000040)=@xdp={0x2c, 0x0, <r1=>0x0}, &(0x7f00000000c0)=0x80)
ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@mcast2, 0x65, r1})
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffffffffffd}, 0xfffffffffffffd49)

03:25:56 executing program 2:
semget$private(0x0, 0x1, 0x20)
r0 = semget$private(0x0, 0xffffffffffffffff, 0x20)
semop(r0, 0x0, 0xffffffffffffff9f)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40})
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_open_pts(r1, 0x0)
write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b)
ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4})
ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17, 0x5b03})
time(&(0x7f0000000440))
perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x3, 0x0)
r4 = accept(0xffffffffffffffff, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80)
r5 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0xd9e2, 0x8000)
ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x40247007, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000900)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
gettid()
getpid()
fcntl$getownex(r4, 0x10, &(0x7f00000004c0))
r7 = getpgrp(0xffffffffffffffff)
r8 = syz_open_procfs(r7, &(0x7f00000006c0)='net/tcp\x00')
ioctl$TIOCGETD(r8, 0x5424, &(0x7f0000000580))
set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3})
rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00')
write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fc020000000000000000"], 0x2a)
mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0)
mount(&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80010, 0x0)
mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3015cf63ee466a17abdb3f603325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089ee8aa3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a00bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0)
r9 = dup2(r8, r1)
ioctl$TCSBRKP(r2, 0x5425, 0x3)
write$FUSE_OPEN(r9, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20)
pivot_root(&(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='./file0\x00')
mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780))

03:25:56 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}], [{@subj_user={'subj_user', 0x3d, ']'}}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
ioctl(r0, 0xfffffffffffffffc, &(0x7f0000000000)="54fefceeb9596ef7b8ccb312ef2742aeac1525d8a5c6a6265f94f71ff3530b831ee99351c39d24ca5b3985ab735fa2eb7601016a9b7574d837205bc726da05784ed04c8c0fd52220f77150fed0859efe9ce487b744b612af59cd6d7b942032531542db1ed4121fd85d52ef3d269a14a3e1")
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  223.886405] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
[  223.925703] FAT-fs (loop2): Filesystem has been set read-only
03:25:56 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40000, 0x0)
setsockopt$inet6_dccp_int(r1, 0x21, 0xb, &(0x7f0000000100), 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x200)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400801, 0x0)

03:25:56 executing program 3:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40)
setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f00000000c0)=@routing={0xfd, 0x8, 0x2, 0x4, 0x0, [@mcast1, @loopback, @mcast2, @mcast2]}, 0x48)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  224.061766] Dev loop4: unable to read RDB block 1
[  224.078938]  loop4: unable to read partition table
03:25:56 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getuid()

03:25:56 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  224.107263] loop4: partition table beyond EOD, truncated
[  224.138934] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:56 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
clock_gettime(0x0, &(0x7f00000002c0)={<r1=>0x0, <r2=>0x0})
recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000180)=""/229, 0xe5}, {}, {&(0x7f0000001340)=""/83, 0x53}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/120, 0x78}, {&(0x7f0000002440)=""/137, 0x89}, {&(0x7f0000002500)=""/96, 0x60}, {&(0x7f0000002580)=""/221, 0xdd}], 0xa, &(0x7f0000002740)=""/132, 0x84}, 0x401}], 0x1, 0x40000000, &(0x7f0000002800)={r1, r2+30000000})
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:56 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  224.211374] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  224.239049] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  224.289781]  loop1: p1[EZD]
[  224.292343] tmpfs: No value for mount option '�3����絵f��AH@o'
[  224.363233] tmpfs: No value for mount option '�3����絵f��AH@o'
03:25:56 executing program 2:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0)
rt_sigsuspend(&(0x7f0000000000), 0x8)
r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0)
r2 = socket$kcm(0x29, 0x2, 0x0)
sendfile(r2, r1, 0x0, 0x10001)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0)
r4 = shmget(0x0, 0x2000, 0x1182, &(0x7f0000ffd000/0x2000)=nil)
openat$userio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/userio\x00', 0x8080, 0x0)
shmctl$SHM_UNLOCK(r4, 0xc)
syz_mount_image$minix(&(0x7f0000000180)='minix\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000200)="798a65e25875596ed794b2658eb323878f05d385f2f06f1ec3ed210ba1152a66832e908cd12b987ee871069d073dd8762bb44388a9fa2d7afac4888f9a325c1a758e892a2f14f731e53c9615c675073f533d76f44bf7d677ebb6ae7b8bbdeb6f154e0c2812864d9dcb33bc1223821707d7708383090d3dce47ff5d2406d37561852554c4ad9d", 0x86, 0x7}, {&(0x7f00000002c0)="c2abfc86c9751438f4ee39b7424da8950080a5d4e0bef798633d62ea6865d5d3ab34f4ceb6c3c312df90a282000f82c74f772fa6cee53826619b7e64458c8eff4e6f3a0b7ed1ee9e9c03cd6a4a31b6511070fed4933552bde56143b40273b72b7238d8bf349397ccaffa0f8285ecd414a71e706cd6d7e861dbae65a4255ca066bbc9da3ddd02a0e597649bf13fda4f0e1af3996a03ad341fea43d42f9900bf119d39975be530bbf842191b48105892d27c21498da34fadfe89862c483611c65668d4add60e20ebd9d19ef4e6219a0a6cbfac92bc5be9ac286338af4637e7ef00b51d851596d72b3f65e12f86f28b80", 0xef, 0x5}, {&(0x7f00000003c0)="9c58d15df3015d1ba9c831f8ae033302d2ee61dae2191edaa8197282272c5eac668a47cf68a4bcc9bcb6", 0x2a, 0x1}, {&(0x7f0000000400)="c81aaaca2285bb0f439cc6bb9b676b70d266dbb5c27609f6a6d3398ebba0597c961bcaeebd02a888652227bb49fcc29d518f501ae476d81f8c7d5659d6c4e936e886cd1d4ee7f11f53c6152eeb9d38535f9bb1ded17e64b36e636534fadad1edad8bc74c9fc993bec99ed9b16c524d481de39cdbc5c0bd730bbafc0e931c18982149de0ee4aa9540e7c0dd80e782dc6457f5016b", 0x94, 0x9}], 0x20000, 0x0)
getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x8)

03:25:56 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e22, @loopback}], 0xfffffffffffffee7)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:56 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = syz_open_dev$audion(&(0x7f0000000880)='/dev/audio#\x00', 0x4, 0x28040)
getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000008c0)={<r2=>0x0, 0x3ff, 0x3, [0x3ff, 0xea, 0x7fffffff]}, &(0x7f0000000900)=0xe)
getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000940)={r2, 0xa2, "5bef1a5ccc4154a803d290be9eaf7ee48ec1807077fafdf4c2d6a597b1e33b89cbcc9df15e82f0d862d5c1ff7d2d60282fddb5503836d83e02c4369c8dd753e72d7337aaf852d87d9a7353d43d4fba0478be06ffc05dbcb005b1c9816b9ecc81b1ae039c0b7773bc1e506cf63c07a159e312cce4fdb1f4b85bf88cc3bce1d84f4c3c4f235d8b110a4f8d8fb49f42a38673ce9305d60317fb366c199f1fd357297bab"}, &(0x7f0000000a00)=0xaa)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @loopback}, 0x1c)

[  224.441097] Dev loop4: unable to read RDB block 1
[  224.446208]  loop4: unable to read partition table
[  224.470797] loop4: partition table beyond EOD, truncated
03:25:56 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0xdaf5, 0x0, 0xa1d})
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2)
ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00000000c0))

[  224.494119] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:56 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20100, 0x0)
getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f00000000c0)=0x4)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:56 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:56 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40080, 0x0)
ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000140)={0x9, 0x3, 0x3, 0x2, 0x0, 0x1})
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xfff, 0x408601)
openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0)
ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000040))
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  224.651030] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  224.668933] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  224.679452]  loop1: p1[EZD]
03:25:56 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1ff, 0x288000)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x2, 0x4, 0x2, 0x6f01, 0x1, 0x707, 0x2c63c406, 0x0, <r2=>0x0}, &(0x7f00000000c0)=0x20)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0xff, 0x4}, 0x8)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  224.715629] Dev loop4: unable to read RDB block 1
[  224.721866]  loop4: unable to read partition table
[  224.747430] loop4: partition table beyond EOD, truncated
[  224.753743] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:57 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000040)=0x10, 0x80000)
ioctl$VFIO_IOMMU_MAP_DMA(r0, 0x3b71, &(0x7f0000000100)={0x20, 0x1, 0x5, 0xffffffffffff0001, 0xfffffffffffffffe})
ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0))

03:25:57 executing program 2:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
r1 = dup(r0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={<r2=>0x0, @in6={{0xa, 0x4e20, 0x7, @rand_addr="0f3523b51f9a10c91b34bfb41065061a", 0x100}}, 0x81, 0x8, 0x1000, 0x8}, &(0x7f0000000000)=0x98)
setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x1, 0xb4, "bcc4ca88bbe4e4ae614a33ef3e33dee0012b02e5930c02e012f84e480a2b912c58920c39d9e4303e40ebe420b10725f7760e847cb9d1a2c96ed57e828d92105761c0b31f989cb47b19a913510484f1fe32e1ee91aa4f7c15785be6e840eeaa4990d2682d242c2b3adbd510c5ce31b563e89643b128b14044c401c5df6cb1959d2655253ec27787e4611beb6ff42cd9f91f620edf8499d4e3bbaf5d1db3948fc950431eafd2217c5c78360384d97ae1b9baa05fca"}, 0xbc)
ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000080))

03:25:57 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xfffffd62)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:57 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:57 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:57 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000180)={0x5, 0x0, [{}, {}, {}, {}, {}]})
lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "1f851784b791feb55a5c8bf6792dc04ba54977c2"}, 0x15, 0x1)
r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2, 0x0)
setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x2, 0x4)

03:25:57 executing program 2:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2)
ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f00000000c0))
sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800000003060d01ff0488fffdff7f57ffccad000c000100060d00100919020002000000f6f00061"], 0x28}}, 0x0)
exit_group(0x0)

03:25:57 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x2)
r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x101000)
r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8)
getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000340)={@empty, @multicast1, <r4=>0x0}, &(0x7f0000000380)=0xc)
sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xe4, r2, 0x2, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x7c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xff}}}]}}, {{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x669}}, {0x8}}}]}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x1}, 0x4008010)
ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0))
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x2}, 0x1c)

03:25:57 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0)
setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000040)=0x7, 0x4)

[  225.438264] Dev loop4: unable to read RDB block 1
[  225.447768]  loop4: unable to read partition table
[  225.478823] loop4: partition table beyond EOD, truncated
[  225.502995] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
[  225.511616] Dev loop5: unable to read RDB block 1
[  225.517737]  loop5: unable to read partition table
03:25:57 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0)
ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000040)=0xf4240)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  225.524964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'.
[  225.542694] loop5: partition table beyond EOD, truncated
[  225.565026] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:25:57 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:57 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:57 executing program 2:
r0 = socket$inet(0xa, 0x801, 0x84)
connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="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")
lremovexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'os2.', '-\x00'})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000140)=""/146)
listen(r0, 0xfc0004)
r1 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb)
recvmmsg(r1, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400})

[  225.591243] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  225.607917] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  225.615219]  loop1: p1[EZD]
03:25:57 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000700))
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:57 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:57 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100000000, 0x0)
fgetxattr(r0, &(0x7f00000000c0)=@random={'security.', '-wlan0*em1selinuxsystem-\x00'}, &(0x7f0000000100)=""/40, 0x28)
dup3(r0, r0, 0x80000)
r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1f, 0x1a1102)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}], 0x10)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:57 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800)
getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={<r2=>0x0, 0xd7c, 0x0, 0xffffffff}, &(0x7f00000000c0)=0x18)
getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x27c}, &(0x7f0000000140)=0x8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:57 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x2, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = dup3(r0, r0, 0x80000)
ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000000c0)=""/231)

03:25:57 executing program 2:
r0 = open(0x0, 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x3e1, 0x3)
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000ffb000/0x1000)=nil, 0x1000}, 0x2})
ioctl(0xffffffffffffffff, 0x0, 0x0)
connect$ax25(0xffffffffffffffff, 0x0, 0x0)
syz_open_dev$loop(0x0, 0x0, 0x6)
syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00')
sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x841}, 0x4004080)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x60, 0x2)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={<r2=>0x0, 0xffff}, &(0x7f0000000200)=0x8)
getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000500)={r2, 0x81, "b487d861c9853b46526ef1d9c60d11d014934a270fcfc06468196ab3c78b68825b700a1162853d2e5b69d836fea9beea922dae9f7325130d5c0a1572cc05bd872f25463f01d8a229d6ddcc964dea14ccdfe2b23a29443842e69f3774b0c7fbfe252a5858488fc313efcc808e274c938cb485269cbfc164308d3234af9ddfeb5b29"}, &(0x7f0000000240)=0x89)
openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0)
fchdir(r1)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0)
umount2(&(0x7f0000000400)='./file0\x00', 0x0)

[  225.820814] Dev loop4: unable to read RDB block 1
[  225.828157]  loop4: unable to read partition table
[  225.850816] Dev loop5: unable to read RDB block 1
[  225.855726]  loop5: unable to read partition table
03:25:58 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)

[  225.869790] loop4: partition table beyond EOD, truncated
[  225.876975] loop5: partition table beyond EOD, truncated
[  225.895015] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  225.907910] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:58 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
r2 = socket(0x40000000001e, 0x1, 0x0)
getsockopt(r2, 0x800000010f, 0x82, &(0x7f00004ad000), &(0x7f0000a3c000)=0xffffffad)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0)

03:25:58 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  225.971271] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:58 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:58 executing program 0:
r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0)
setsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000040)=0x200, 0x4)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
write$capi20_data(r0, &(0x7f0000000100)={{0x10, 0xfffffffff000ba5b, 0x0, 0x82, 0x5}, 0x2f, "cf33bd1fdb269acac3ee9935881245b35d960f0f03e848c6728b3d14e5da7dd8e798becdb00a220691ed89d5764e49"}, 0x41)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e1f, 0xfffff7fffffffffc, @local, 0x8}, 0x1c)

03:25:58 executing program 2:
r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2)
ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000500))
ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000000)={0x8000, 0xfef})

[  226.022890] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:58 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:58 executing program 3:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80280, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x7, 0x3, 0x0, 0x3, 0x7f, 0x7ff, 0x5, 0x6d, <r1=>0x0}, &(0x7f00000000c0)=0x20)
setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x80000000}, 0x8)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r2, 0x0)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000340)="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", &(0x7f0000000140)=""/33}, 0x18)

[  226.082251]  loop1: p1[EZD]
03:25:58 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400000000000072, 0xffffffffffffffff, 0x0)
setsockopt$bt_BT_RCVMTU(r1, 0x112, 0x4, &(0x7f0000000140), 0x2)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000600)={<r2=>r0})
setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000640)=0x4, 0x4)

03:25:58 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = socket$inet(0x2, 0x3, 0x19)
connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
r2 = socket$inet(0x2, 0x3, 0x19)
setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}, {0x2, 0x0, 0x3}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8)
setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x17, 0x0, 0x0)

[  226.156455] Dev loop5: unable to read RDB block 1
[  226.162625]  loop5: unable to read partition table
[  226.168905] Dev loop4: unable to read RDB block 1
[  226.178843] loop5: partition table beyond EOD, truncated
[  226.188441]  loop4: unable to read partition table
03:25:58 executing program 2:
prctl$PR_SET_SECUREBITS(0x1c, 0x1)
r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0)
ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x1)

03:25:58 executing program 3:
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x101000, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x2, 0x3, 0x7, 0x101, '\x00', 0x90})
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:58 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  226.207954] loop4: partition table beyond EOD, truncated
[  226.218431] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  226.247092] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:58 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:58 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x406, r0)
ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
migrate_pages(0x0, 0x6, &(0x7f0000000400)=0x96e, &(0x7f0000000440)=0x3)
ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000001c0)=<r3=>0x0)
lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
r5 = getgid()
r6 = getpid()
r7 = getuid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, <r8=>0x0}, &(0x7f0000000300)=0xc)
ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000740)=""/227)
r9 = gettid()
getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000340)=0xe8)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, <r11=>0x0}, &(0x7f0000000580)=0xc)
sendmsg$unix(r1, &(0x7f0000000700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="367bf0c799c6f7bd03c45e1d92670213b563ee70f184439ead02de21b38f2fc894952f3dc90ba0c821fa6f24ff2959986da40e4fd58c8b31ea416ffd3a1ceb435def9d7e0d936ffe9a5a3b1487a8912e04f0112f48f012d0436aa5e5ef2e70b4eb248621895b07416257d37dd2c19d592a0250fbef182422d9eec6cf32d97cbc3b56c1f8fa1e10cfa93043e6c862b0b508ae657698f6f6d51a49a27aa36be5a4e5b571a4952d36035c", 0xa9}], 0x1, &(0x7f00000005c0)=[@rights={{0x34, 0x1, 0x1, [r2, r0, r0, r1, r0, r1, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @rights={{0x2c, 0x1, 0x1, [r2, r2, r0, r1, r0, r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @rights={{0x18, 0x1, 0x1, [r2, r2]}}, @rights={{0x20, 0x1, 0x1, [r1, r2, r0, r1]}}, @rights={{0x28, 0x1, 0x1, [r2, r2, r2, r1, r0, r2]}}], 0x128}, 0x20000000)

03:25:58 executing program 3:
r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
ioctl$TCXONC(r0, 0x540a, 0x7fff)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
shutdown(r1, 0x0)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getpeername$packet(r0, &(0x7f00000002c0)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14)
ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7a, r2})
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x8)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4)

[  226.412113] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  226.435859] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  226.445389] Dev loop5: unable to read RDB block 1
[  226.452154]  loop5: unable to read partition table
[  226.457322] loop5: partition table beyond EOD, truncated
[  226.475320] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  226.475818]  loop1: p1[EZD]
[  226.509414] Dev loop4: unable to read RDB block 1
[  226.516204]  loop4: unable to read partition table
[  226.535874] loop4: partition table beyond EOD, truncated
[  226.552212] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
03:25:59 executing program 0:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x226500, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x1000, 0x4, 0x1, 0x401, <r1=>0x0}, &(0x7f0000000200)=0x10)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={r1, 0x8}, &(0x7f00000002c0)=0x8)
bind$vsock_dgram(r0, &(0x7f0000000340)={0x28, 0x0, 0x2711}, 0x10)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=<r2=>0x0, &(0x7f00000000c0)=0x4)
getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xc, 0xfff}, 0x8)

03:25:59 executing program 2:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40202, 0x0)
write$P9_RFSYNC(r2, &(0x7f0000000080)={0x7, 0x33, 0x1}, 0x7)
r3 = dup2(r1, r0)
connect$unix(r0, &(0x7f00000000c0)=@abs, 0x6e)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)={0x1, [<r4=>0x0]}, &(0x7f0000000180)=0x8)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000001c0)={r4, 0xfffffffffffffff7}, &(0x7f0000000200)=0x8)

03:25:59 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={<r1=>0x0, 0x5}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x100000000}, &(0x7f0000000100)=0x8)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:59 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:59 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:59 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:59 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
prctl$PR_SET_TSC(0x1a, 0x2)
ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x4000100323, 0x6, 0x0, 0x0, 0x0, 0x200000000000000})

03:25:59 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000280)}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0xffffffb4)

03:25:59 executing program 0:
r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)

03:25:59 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={<r1=>0x0, 0x5}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x100000000}, &(0x7f0000000100)=0x8)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  227.098124] Dev loop5: unable to read RDB block 1
[  227.103421] Dev loop4: unable to read RDB block 1
[  227.122097]  loop5: unable to read partition table
[  227.122278]  loop4: unable to read partition table
[  227.132408] loop5: partition table beyond EOD, truncated
03:25:59 executing program 3:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
shutdown(r0, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  227.149089] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  227.164253] loop4: partition table beyond EOD, truncated
03:25:59 executing program 2:
r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000)
ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000080)})
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000140)=0x1d, 0x4)
mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='ecryptfs\x00', 0x0, &(0x7f0000000440)='\x00')
mknod$loop(&(0x7f0000000000)='./file0\x00', 0x258, 0x1)
mkdir(&(0x7f0000000040)='./file0\x00', 0x101)

03:25:59 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = fcntl$dupfd(r0, 0x406, r0)
ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0xfffffffffffffffe, {0x10001, 0x9, 0x3, 0xfff, 0x40, 0xd5}})
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x1ff, @mcast2, 0x7a4eda8d}, 0x1c)

[  227.190964] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  227.206298] loop_reread_partitions: partition scan of loop4 () failed (rc=-5)
[  227.214226] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:25:59 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  227.241364]  loop1: p1[EZD]
03:25:59 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x800400, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  227.297599] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README
03:25:59 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000400)={0x8, 0xffffffff})
pipe2(0x0, 0x0)
setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4)
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001900)={'team0\x00'})
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4004)
prctl$PR_GET_FP_MODE(0x2e)
unlink(&(0x7f0000000280)='./bus\x00')
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000200)={@mcast2, <r3=>0x0}, &(0x7f0000000380)=0x14)
ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000003c0)={@remote, 0x6b, r3})
getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000080)=0xe8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x7, 0x100000001, 0x6, 0x5, 0x8, 0x19})
ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000480))
getxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000180)=@known='security.apparmor\x00', &(0x7f00000006c0)=""/80, 0x50)
ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x1600, 0x3ef, 0x2000000, 0x3f00000000000000, 0x100000000000600, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}})
prctl$PR_GET_FP_MODE(0x2e)
ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback})
ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000240)={0x100004, 0x0, 0xff, 0x9, 0x5})
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
ftruncate(r1, 0x80a48202)
lchown(0x0, 0x0, 0x0)
ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000680)="50bfbf9a93ca3aa179cba2")
getpeername$packet(0xffffffffffffffff, 0x0, 0x0)
setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4)
sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80841000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0x0, 0x320, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4008000)
statfs(&(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0)=""/187)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4008040, &(0x7f0000000740)={0x2, 0x4e23, @empty}, 0x10)

[  227.338917] Error parsing options; rc = [-22]
03:25:59 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  227.363127] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README
03:25:59 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x80)
ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0xffffffffffffffff}, 0x1c)

[  227.421486] Dev loop5: unable to read RDB block 1
[  227.428456]  loop5: unable to read partition table
[  227.433825] Error parsing options; rc = [-22]
[  227.453658] loop5: partition table beyond EOD, truncated
03:25:59 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001400)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000100)={0x200000000007b, 0x0, [0x10a, 0x0, 0x10], [0xc1]})
r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0)
ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000040)=0x11)

[  227.478467] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:25:59 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:59 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:59 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1fffffffffffff65, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:25:59 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet(0x10, 0x3, 0x4)
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x150, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x692e}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc94e}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xde}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff3861}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1c000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2a6a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x157}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6f2}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x24008000}, 0x800)
r3 = openat$null(0xffffffffffffff9c, 0x0, 0x10000000000, 0x0)
getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54)
sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0)

[  227.610852] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:25:59 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bind$inet(r0, &(0x7f0000942000)={0x2, 0x1000000004e20, @multicast2}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4)
connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0xfffffffffffffee5)
sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000b80)="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", 0x240}], 0x1}}], 0x1, 0x4000000)

[  227.653354] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  227.694234]  loop1: p1[EZD]
03:25:59 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0)
openat(r1, &(0x7f0000000040)='./file0\x00', 0x200, 0x10)

03:25:59 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:59 executing program 1:
r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x200000000}}, {@aname={'aname', 0x3d, '}!^:]nodev/-ppp1cpuset'}}, {@version_9p2000='version=9p2000'}, {@debug={'debug'}}, {@uname={'uname'}}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@obj_role={'obj_role', 0x3d, 'eth1'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:25:59 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet(0x10, 0x3, 0x4)
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x150, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x692e}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc94e}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xde}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff3861}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1c000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2a6a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x157}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6f2}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x24008000}, 0x800)
r3 = openat$null(0xffffffffffffff9c, 0x0, 0x10000000000, 0x0)
getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54)
sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0)

03:25:59 executing program 2:
mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x122a, 0x1)

[  227.826698] Dev loop5: unable to read RDB block 1
03:25:59 executing program 0:
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x802, 0x0)
ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040))
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  227.850676]  loop5: unable to read partition table
[  227.868572] loop5: partition table beyond EOD, truncated
03:25:59 executing program 3:
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000090607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0)
r1 = dup(r0)
ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000040))

03:26:00 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0)
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x511000, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={<r1=>0xffffffffffffffff}, 0x2, 0xf}}, 0x20)
write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e21, 0x80, @loopback, 0x8f3}, r1}}, 0x38)
r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00')
preadv(r2, &(0x7f0000000480), 0x1000000000000269, 0x10400003)

[  227.920843] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  227.974632] audit: type=1400 audit(1564716360.025:63): avc:  denied  { ioctl } for  pid=11382 comm="syz-executor.3" path="socket:[40882]" dev="sockfs" ino=40882 ioctlcmd=0xae65 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
03:26:00 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:00 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:00 executing program 3:
r0 = userfaultfd(0x0)
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x20000000000031, 0xffffffffffffffff, 0x43)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0))
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1})
lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000})

03:26:00 executing program 0:
r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f00000000c0)=0x80, 0x0)
getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=<r1=>0x0, &(0x7f0000000140)=0x4)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="01000000cf5da2bcffc2144c227786654324f8021bde4019b7dfe5471e98c274542a3de54e936345247c90c4afa6c67544b54a273f3cdf80cb309f70eb"], &(0x7f00000001c0)=0x8)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:00 executing program 2:
r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x0, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x8, 0x1, 0x2e8fe159}, 0x20)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x1, 0x0)
ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000005c0))
syz_open_dev$admmidi(0x0, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0)
listen(r1, 0x8)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000100)={0x0, "0114f683ff5697c507390cb874e9269468ac2e1354aa124544ba48b4da48fd7f"})
r4 = accept4(r1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4), 0x0)
socket$alg(0x26, 0x5, 0x0)
close(r4)

03:26:00 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={<r1=>0x0, 0x2, 0x0, 0x1ff, 0x6}, &(0x7f0000000040)=0x18)
getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x5, 0x201, 0x80, 0x8, <r2=>r1}, &(0x7f0000000180)=0x10)
setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x229)
socketpair(0x19, 0x0, 0x400006, &(0x7f00000001c0)={<r3=>0xffffffffffffffff})
ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f0000000200)={{0x100000000, 0x400, 0xfff, 0x4, 0x890, 0x2}, 0xfff})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r4 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8001, 0xa000)
ioctl$UI_SET_EVBIT(r4, 0x40045564, 0xe)

[  228.171642] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  228.197944] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  228.243349] Dev loop5: unable to read RDB block 1
[  228.248436]  loop5: unable to read partition table
[  228.259623]  loop1: p1[EZD]
[  228.274863] loop5: partition table beyond EOD, truncated
[  228.283638] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:00 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x10)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000001c0)={<r2=>0x0, 0x1}, &(0x7f0000000240)=0x8)
setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000340)={r2, 0x5352a9d8, 0x1000, "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"}, 0x1008)
sendto$inet(r1, &(0x7f00000001c0), 0x0, 0x20000000, &(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0x10)
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@empty, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:00 executing program 3:
r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f00000000c0)=0x80, 0x0)
getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=<r1=>0x0, &(0x7f0000000140)=0x4)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="01000000cf5da2bcffc2144c227786654324f8021bde4019b7dfe5471e98c274542a3de54e936345247c90c4afa6c67544b54a273f3cdf80cb309f70eb"], &(0x7f00000001c0)=0x8)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:00 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:00 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  228.307523] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  228.338401] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:00 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockname(r0, &(0x7f0000000000)=@tipc=@name, &(0x7f00000000c0)=0x80)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  228.412457]  loop4: p1[EZD]
[  228.424733] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:00 executing program 3:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
stat(&(0x7f0000000340)='./file0\x00', 0x0)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x0)
ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x9c1, 0x0, 0x9}]})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
accept(r0, &(0x7f0000000180)=@tipc=@id, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0)
r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0xe)
write(r3, &(0x7f0000000600)="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", 0x200)
sendfile(r3, r4, 0x0, 0x10000)

[  228.522839] loop_reread_partitions: partition scan of loop4 () failed (rc=-16)
[  228.531016] Dev loop5: unable to read RDB block 1
[  228.536098]  loop5: unable to read partition table
[  228.543882] print_req_error: 185 callbacks suppressed
[  228.543888] print_req_error: I/O error, dev loop4, sector 1
[  228.580397] loop5: partition table beyond EOD, truncated
[  228.588829] audit: type=1800 audit(1564716360.635:64): pid=11458 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=11 res=0
[  228.621025] print_req_error: I/O error, dev loop4, sector 1
03:26:00 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  228.626815] buffer_io_error: 184 callbacks suppressed
[  228.626821] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  228.649709] print_req_error: I/O error, dev loop4, sector 5
[  228.656062] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  228.663787] print_req_error: I/O error, dev loop4, sector 1
[  228.669522] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  228.677293] print_req_error: I/O error, dev loop4, sector 5
[  228.683210] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  228.691080] print_req_error: I/O error, dev loop4, sector 1
[  228.692653] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  228.696823] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  228.696933] print_req_error: I/O error, dev loop4, sector 5
[  228.707012] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  228.713964] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  228.734361] print_req_error: I/O error, dev loop4, sector 1
[  228.740270] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  228.748090] print_req_error: I/O error, dev loop4, sector 5
[  228.753988] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  228.761744] print_req_error: I/O error, dev loop4, sector 1
[  228.767584] Buffer I/O error on dev loop4p1, logical block 0, async page read
03:26:00 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x48]})
socket$nl_netfilter(0x10, 0x3, 0xc)
r4 = fcntl$dupfd(r3, 0x406, r2)
sendmsg$nl_crypto(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"/381], 0xf0}, 0x1, 0x0, 0x0, 0x20000000}, 0x800)

[  228.775510] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  228.819784] audit: type=1804 audit(1564716360.675:65): pid=11465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/210/file0/file0" dev="loop3" ino=11 res=1
[  228.849850] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:00 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  228.894235]  loop1: p1[EZD]
[  228.948201] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  228.981335] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  228.989708]  loop4: p1[EZD]
03:26:01 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  228.999088] loop4: p1 size 2047 extends beyond EOD, truncated
[  229.062322] Dev loop5: unable to read RDB block 1
[  229.068728]  loop5: unable to read partition table
03:26:01 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:01 executing program 2:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  229.113752] loop5: partition table beyond EOD, truncated
03:26:01 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x9, 0xffffffffffffff07})
r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000001c0)={0x1, 0x23, 0x2})
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0))

[  229.158374] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:01 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  229.317942] audit: type=1804 audit(1564716361.365:66): pid=11516 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/210/file0/file0" dev="loop3" ino=11 res=1
03:26:01 executing program 3:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
stat(&(0x7f0000000340)='./file0\x00', 0x0)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x0)
ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x9c1, 0x0, 0x9}]})
syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
accept(r0, &(0x7f0000000180)=@tipc=@id, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0)
r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0xe)
write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r3, r4, 0x0, 0x10000)

03:26:01 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x3}, 0x1)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2)

03:26:01 executing program 2:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  229.387934] audit: type=1804 audit(1564716361.405:67): pid=11465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/210/file0/file0" dev="loop3" ino=11 res=1
03:26:01 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180), 0xfffffffffffffef3)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  229.470584] Dev loop5: unable to read RDB block 1
[  229.475495]  loop5: unable to read partition table
[  229.483180] loop5: partition table beyond EOD, truncated
[  229.491163] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  229.499625] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  229.522781] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  229.531551] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  229.541104] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  229.556629]  loop1: p1[EZD]
[  229.566469]  loop4: p1[EZD]
03:26:01 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:01 executing program 2:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:01 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x121400)
ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}]})
getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  229.586142] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:01 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:01 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  229.708872] audit: type=1800 audit(1564716361.755:68): pid=11542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="loop3" ino=12 res=0
03:26:01 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x2000005d, &(0x7f0000000280)}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={<r1=>0x0, 0x3, 0x20}, &(0x7f0000000040)=0xc)
setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x400}, 0x8)

03:26:01 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  229.827446] audit: type=1804 audit(1564716361.755:69): pid=11542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/211/file0/file0" dev="loop3" ino=12 res=1
[  229.855606] Dev loop5: unable to read RDB block 1
[  229.865168]  loop5: unable to read partition table
[  229.907167] loop5: partition table beyond EOD, truncated
[  229.940007] sctp: [Deprecated]: syz-executor.0 (pid 11575) Use of struct sctp_assoc_value in delayed_ack socket option.
[  229.940007] Use struct sctp_sack_info instead
03:26:02 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x0, [0x48]})
socket$nl_netfilter(0x10, 0x3, 0xc)
r4 = fcntl$dupfd(r3, 0x406, r2)
sendmsg$nl_crypto(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"/381], 0xf0}, 0x1, 0x0, 0x0, 0x20000000}, 0x800)

[  229.949961] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  230.041696] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  230.065214] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  230.111885]  loop4: p1[EZD]
[  230.128348] loop4: p1 size 2047 extends beyond EOD, truncated
[  230.223221] loop_reread_partitions: partition scan of loop4 () failed (rc=-16)
03:26:02 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/psched\x00')
preadv(r1, &(0x7f00000017c0), 0x199, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000200)={0x14, "9e5056cc4b8047ebaa8aa80978f52d7fc58bf85f"})
getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x3, 0xfffffffffffffe4b, [], 0x4, &(0x7f00000000c0)=[{}, {}, {}, {}], &(0x7f0000000100)=""/2}, &(0x7f00000001c0)=0x78)

03:26:02 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
timerfd_gettime(r0, &(0x7f0000000000))
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0xa2, @local}, 0x1c)

03:26:02 executing program 2:
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'})
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x8d4)
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x900000000, 0x0)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000540)=0xe8)
setuid(r2)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r1, 0x400, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x2, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x8000)
r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(r3, 0x6685, &(0x7f0000000280)={0x1, 0x8, 0x1000, 0x9d, &(0x7f0000000100)="13e7a0866bdefe9ee48ace9c007dc1f8ad03d4022a126e801a92aa41a3c80296e01406a1948412af87d6485d6ea210a538849ad74869b80c8e7177239b601fab89621f412c73586ec4cd02a5ebd0b77e187466f36f71710f7c71bab03368cb8228c2344a0869e91bd20063bf4801f48d6dcba699c6535d8b2c1f69c2bffe07aba527717ab2f3ca48f4ae34b77dba00135d1ea63608481741a6a320acfe", 0x8c, 0x0, &(0x7f00000001c0)="9a129ebc5760d566cef36f6a00c394dbbae2adb02b0685e23eda0155a8f7b92c725ef7c677ab3d307a663393272c7263421c96cd43856ed6d667e61d5a7c2bb9b49272f5992ffc43ae5ef01e44391a3277a3636ccff46bb5218a6c274fe4d1e3c63b1ed13a9acfd542c04a8552666446f308a706433940a4c9354113310e80b0061d66fa74f45483fa1f0b47"})

03:26:02 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:02 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:02 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:02 executing program 2:
r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0)
sendmsg$sock(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)="88ff28e0304ad3601354aaa6fc60a64e7925f2348806d4d2fde91dc77d5ed96005612c1c812d991277f6ba792ba15a5438b1a7e81fe315f4553dfbbe7a70b202d48654f477c110cff870e1b5fa8b3ca3881c284b70c2813cb94571dec76cdd16ee06c67af99afde2b4de1831fd849f13df57911f35584e2ebe6a50e5907f9ac8ab58b7b562e826b16a312333be53bfa2e667b9904b2f2799a40ad9d21bb5c46b702b0a423c44f7c71f3b3fbcb993b805b589fb6622cc42f7abd0c4bc", 0xbc}, {&(0x7f0000000180)="d7bfe44b010b7e82e905871de87111225a4dc362328d7cd16c2f5bd2cb43efa2abc4e1711db51771fcd620094a47d23c5cbf95b107ba5f20cc71bd6a645fe6d46be33b", 0x43}], 0x2, &(0x7f0000000240)=[@timestamping={{0x14, 0x1, 0x25, 0x100}}, @mark={{0x14, 0x1, 0x24, 0xb35}}, @mark={{0x14, 0x1, 0x24, 0x400}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x7ff}}], 0x78}, 0x4)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0xfffffffffffffff7}, 0x2c)

03:26:02 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
r1 = gettid()
mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0)
mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0)
r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0)
splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0)
tkill(r1, 0x13)
close(r2)
r5 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:02 executing program 2:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
timerfd_gettime(r0, &(0x7f0000000000))
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0xa2, @local}, 0x1c)

03:26:02 executing program 3:
creat(&(0x7f00000001c0)='./file0\x00', 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = getpid()
prctl$PR_SET_PTRACER(0x59616d61, r1)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x38)
ptrace$cont(0x18, r2, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x7ff, 0x0, 0x0, 0x3, 0x1})
ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r2, 0x0, 0x0)

[  230.613023] Dev loop5: unable to read RDB block 1
[  230.618172]  loop5: unable to read partition table
03:26:02 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:02 executing program 2:
modify_ldt$write2(0x11, &(0x7f0000000000)={0x400, 0x20001000, 0xfffffffffffffffd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, 0x28b)
modify_ldt$write2(0x11, &(0x7f0000000040), 0x10)

[  230.660094] loop5: partition table beyond EOD, truncated
[  230.685338] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:26:02 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={<r1=>0x0, 0x590}, &(0x7f0000000040)=0x8)
setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0x8}, 0x8)
setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@int=0x7f0000000, 0x4)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x300, 0x0)
ioctl$VFIO_SET_IOMMU(r2, 0x3b66, 0x3)
ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000140)={0x8, "585c170da52e257c3530ab3f1c6a0d91038d529586321df3a5e3190746182724", 0x1, 0x1})
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x15)

03:26:02 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
sendmsg(r0, &(0x7f0000001340)={&(0x7f0000000000)=@can, 0x80, &(0x7f0000001300)=[{&(0x7f00000001c0)="b276a86074904aacf18ebddf7fac04a7f04363e108905b7ce7dae42ed308a06216c523cd875f560093106ec57f0c6f45c4b2fd022cc8ab6b8aff2be0cf98bf499c52edd1e5300a05c476d4b7f7fdd63c56ee266bd55dca741a16307ae6d7628350a2b0cb5e23cdd891b563b2bf81edee614357a4654e3895d12dc14b11082aef9a3e086e85864e70615c18be15caaf74e4619ab02e31c704cbc97375780b068a5233387ad32a9239095f394cd24efc39ebaaf225459de768b4a7332c44d2", 0xbe}, {&(0x7f0000000100)="977b4632ba12deb4a1924f374b80a78c44d280bcb75b07b50f36293c398b613d60e30624205a55e46b3d34dbdc9e7a9ec63fc53c8e1786beda9d6dd7edb89a798a81c9d763054019331069", 0x4b}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="4eae973b1fe9371caee03bf3895a00b404f577b2ebd085501d47d20af9785b8b65a210daa314e51db7c45de8c1040311453a1762b59ed9382e901fdbbb373d18f9b57bf766a85feffdcf6daae732228fa71eab87f1daba2cf8a738372a1a85c40d5d6e8f69147824c438598dfc", 0x6d}], 0x4}, 0x20000000)
r2 = fcntl$dupfd(r0, 0x406, r1)
sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0)

[  230.712308] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  230.719912] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  230.741514]  loop4: p1[EZD]
[  230.753927] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:02 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x88)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x100000001, @rand_addr="ff1355dcee91ee1b903ecb1f05813e7f", 0x3}, 0x1c)
openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x101002, 0x0)
write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0)

03:26:02 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:02 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:02 executing program 3:
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs(0xffffffffffffffff, 0x0)
getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, &(0x7f0000000340)=0x1c)
fcntl$notify(r0, 0x402, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0})
openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa)
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000001c0)={0x0, 0xb1c, 0x7, {0x5, 0x7}, {0x0, 0x5}, @period={0x5a, 0x8, 0x7f, 0x65, 0x7, {0x1, 0x0, 0x5, 0x7}, 0x1, &(0x7f0000000140)=[0xc007]}})
eventfd2(0x9, 0x1)
msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4)
syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x800000000001, 0x0)
socket$inet(0x2, 0x4000000000000001, 0x0)

[  230.876973] sctp: [Deprecated]: syz-executor.0 (pid 11674) Use of int in max_burst socket option deprecated.
[  230.876973] Use struct sctp_assoc_value instead
03:26:03 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  230.988163] Dev loop5: unable to read RDB block 1
[  230.998994]  loop5: unable to read partition table
[  231.015975] sctp: [Deprecated]: syz-executor.0 (pid 11692) Use of int in max_burst socket option deprecated.
[  231.015975] Use struct sctp_assoc_value instead
03:26:03 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0)
r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2)
ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0)

[  231.046548] loop5: partition table beyond EOD, truncated
[  231.081705] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:03 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x0, &(0x7f0000000200))
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:03 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x6, @mcast1, 0x5}, @in={0x2, 0x4e23, @rand_addr=0x100000001}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21, @broadcast}], 0xfffffffffffffdff)
ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/42)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x3, @loopback, 0x2}, 0xfffffffffffffe21)
pipe2(&(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f00000001c0)=""/101)
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4000, 0x0)
write$P9_ROPEN(r2, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x20, 0x1}, 0x401}}, 0x18)

03:26:03 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:03 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
flock(r0, 0x8)
accept4(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000000c0)=0x80, 0x80800)
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xf8, r2, 0x302, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xe3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffffffff0000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20004014}, 0x20000080)

[  231.175857] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  231.205791] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  231.264546]  loop4: p1[EZD]
03:26:03 executing program 0:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000300)={0x8, &(0x7f0000000280)}, 0x10)
r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x10000, 0x0)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00')
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000c00}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r1, 0x531, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000)
setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e21, 0x7, @loopback, 0x8}, {0xa, 0x4e24, 0xbd, @remote, 0xfffffffffffff800}, 0x8, [0x6, 0x7f, 0x145d, 0x7, 0x8, 0x7, 0x80000001, 0x6]}, 0x5c)
r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001640)='/dev/sequencer2\x00', 0x100, 0x0)
connect$x25(r2, &(0x7f0000001680)={0x9, @remote={[], 0x2}}, 0x12)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000847000)={&(0x7f0000000380)=ANY=[@ANYBLOB="380100001a0013070000000000000000fe8000000000000000000000000000ff00000000000000000000ffffac14ffaa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x7}}, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x7ff, 0x5, 0x1, 0x8c}]})
ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f00000006c0)=0x35f5)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @remote, 0x1000000000}, 0xfffffffffffffcbf)
ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000200)={0x1, "8cba8d1a86131f6d2a979cdfa731d33adea928db56405ed36019a60972b36c86", 0xa, 0x2, 0x401, 0x1, 0x4})
r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x100, 0x0)
ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f00000001c0)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x4000, 0x1})
ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140))

[  231.287285] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:03 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
munmap(&(0x7f000001f000/0x2000)=nil, 0x2000)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x3d, 0x0)
write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78)
syz_open_pts(r1, 0x8000)
ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)={0x93, 0x7fffffff, 0x4, 0x8, 0x6, [{0xfffffffffffffc01, 0x8, 0x10000}, {0xfffffffffffffffe, 0x6, 0xd, 0x0, 0x0, 0x400}, {0x7, 0x4, 0x0, 0x0, 0x0, 0x202}, {0xb3, 0x4, 0x5, 0x0, 0x0, 0x2000}, {0x6, 0x4, 0x6, 0x0, 0x0, 0xa0a}, {0x800, 0x0, 0x15, 0x0, 0x0, 0x3e82}]})
r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x2)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={<r3=>0x0, @loopback, @initdev}, &(0x7f0000000280)=0xc)
bind$bt_hci(r2, &(0x7f00000002c0)={0x1f, r3}, 0xc)
write$vhci(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="0433340aedb225f3c8fa76d9f1432fac64ac4110db6360652a89949a05aab75661986a12b23a71cfa75ff3044f077c047e883c2dabfd2a2f5ff7ffab2941ed31baa1cd6ace905a628ecc6f76c8989e7fea6cb15da18136dae77e62f767a7862f69fa712d0ab6a073fbd1cfd5bca9f2204de44bdc5485b614033b23815ed9aaaafd57795124b17dbad60a5ea8092b7ad86d1351bcb9d49d7a93f5ca2d29a26d33b5b253f6f94f15c22303c851842b8e4b520907c16952b8e38450417c6d21df58a60a6fc10e35bc998f417795d2f969df663420c000d5842a9ad56376fe5946a9361ba8c1a68ca50450816633922b7f670b6daa264b"], 0xf5)
ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2})
r4 = syz_open_pts(r1, 0x0)
ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000300)=0x3)
ioctl$TIOCSIG(r2, 0x40045436, 0x3e)

[  231.411180] Dev loop5: unable to read RDB block 1
[  231.416165]  loop5: unable to read partition table
[  231.453882] loop5: partition table beyond EOD, truncated
[  231.486734] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:03 executing program 2:
r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0)
r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)
r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0)
ioctl$TIOCSCTTY(r2, 0x540e, 0x1000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10)
add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd)
ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0})
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r3 = dup3(r1, r0, 0x0)
ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0)
r4 = semget(0x0, 0x0, 0x55)
semctl$SETVAL(r4, 0x2, 0x10, &(0x7f0000000000))

03:26:03 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:03 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

03:26:03 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000180)={0xf, 0xb11c, 0x4})
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x200000, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0xffffffffffffff1f)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070")
r4 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10)
r5 = accept$alg(r4, 0x0, 0x0)
sendmsg$alg(r5, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0)
write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0xffffffaa)
recvmsg(r5, &(0x7f0000001480)={0x0, 0xf, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:03 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:03 executing program 3:
syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400001)
openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x80, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl(r0, 0x0, 0x0)
socket$caif_seqpacket(0x25, 0x5, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, 0x0)
getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0)
setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffffffffffc6f)
connect$inet6(0xffffffffffffffff, 0x0, 0x3d8)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0)
syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x14d6, 0x28000)
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0)
bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
listen(r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x329, 0x0)
r3 = accept(r1, 0x0, 0x0)
socket$rxrpc(0x21, 0x2, 0x0)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612)
setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000000000)=0xfffffffffffff772, 0x4)
ioctl$void(0xffffffffffffffff, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, 0x0)
shutdown(r2, 0x200000000001)
recvfrom$inet6(r2, &(0x7f00000001c0)=""/226, 0x204, 0x0, 0x0, 0xffffffffffffff70)
sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8000)

03:26:03 executing program 2:
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8000, 0x0)
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'bond0\x00', {0x2, 0x4e21, @multicast2}})
futex(0x0, 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0)
setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040))

[  231.769318] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
03:26:03 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000200)="c0dca1055e0bcfec7be070")
r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0)
ioctl(r1, 0x3, &(0x7f0000000000)="11c5387000000003000000")
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0105303, 0x0)
ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04)
r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc)
write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e657431747275737465e420207b23406d64f3c5198e5d9e09d87f1bc51135736c6d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f590224cc15567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0ae0f37e8f6007749c3a39b2f1aa56e6b3873c66c9abe4b98dbefb2cd580a59ba1060d1964687732bfd4f9823259f801775c1b673e3f93424175517cb591766b0bdb1635c0e944ac1480c30ccda1c9c1ce5b675e7eec57f71e75c9397e1efc80d128807319fe23a077d91c672b8d0187b57e3a2c3824e2c30a3b627002c2f111a02476215566c53d05942ca4c09358"], 0x16c)
symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00')
r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c)
ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000380)=0x9)
syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2)
syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000)
write$P9_RLOPEN(r3, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18)
listen(r5, 0x200000000002)
r6 = socket$inet6(0xa, 0x5, 0x0)
bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10)
setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140), 0x4)
getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300))
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
signalfd4(r4, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0)
renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0)
dup(0xffffffffffffffff)

[  231.870638] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  231.872925] Dev loop1: unable to read RDB block 1
[  231.885183] Dev loop5: unable to read RDB block 1
[  231.886839] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  231.894934]  loop5: unable to read partition table
[  231.900457]  loop4: p1[EZD]
[  231.904777]  loop1: unable to read partition table
[  231.914165] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:04 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

[  231.915901] loop5: partition table beyond EOD, 
[  231.920957] loop1: partition table beyond EOD, 
[  231.925759] truncated
[  231.935500] truncated
[  231.938792] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  231.952687] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:04 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:04 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  232.186676] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  232.203161] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  232.209380]  loop4: p1[EZD]
[  232.216705] loop4: p1 size 2047 extends beyond EOD, truncated
[  232.253820] Dev loop5: unable to read RDB block 1
[  232.258739]  loop5: unable to read partition table
[  232.258798] loop5: partition table beyond EOD, truncated
[  232.271541] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  232.282793] Dev loop1: unable to read RDB block 1
[  232.287721]  loop1: unable to read partition table
[  232.292871] loop1: partition table beyond EOD, truncated
03:26:04 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

[  232.295605] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  232.307660] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:26:04 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000200)="c0dca1055e0bcfec7be070")
r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0)
ioctl(r1, 0x3, &(0x7f0000000000)="11c5387000000003000000")
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0105303, 0x0)
ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04)
r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc)
write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e657431747275737465e420207b23406d64f3c5198e5d9e09d87f1bc51135736c6d5e6d643573756d20245b29266b657972696e67736563757269747976626f786e6574316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f590224cc15567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d216614370000000000001bac683e39cc8b83f81d723027dffbb4793952725b2e6958194868d5ac6b7235f85739518b51f5d59dd065a823f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0ae0f37e8f6007749c3a39b2f1aa56e6b3873c66c9abe4b98dbefb2cd580a59ba1060d1964687732bfd4f9823259f801775c1b673e3f93424175517cb591766b0bdb1635c0e944ac1480c30ccda1c9c1ce5b675e7eec57f71e75c9397e1efc80d128807319fe23a077d91c672b8d0187b57e3a2c3824e2c30a3b627002c2f111a02476215566c53d05942ca4c09358"], 0x16c)
symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00')
r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c)
ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000380)=0x9)
syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2)
syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000)
write$P9_RLOPEN(r3, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18)
listen(r5, 0x200000000002)
r6 = socket$inet6(0xa, 0x5, 0x0)
bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10)
setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000140), 0x4)
getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300))
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
signalfd4(r4, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0)
renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0)
dup(0xffffffffffffffff)

03:26:04 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:04 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  232.522091] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  232.561194] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  232.590732] Dev loop5: unable to read RDB block 1
[  232.597693]  loop5: unable to read partition table
[  232.609500]  loop4: p1[EZD]
[  232.612691] loop5: partition table beyond EOD, truncated
[  232.618861] loop4: p1 size 2047 extends beyond EOD, truncated
[  232.623680] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  232.644691] Dev loop1: unable to read RDB block 1
[  232.649898]  loop1: unable to read partition table
[  232.658342] loop1: partition table beyond EOD, truncated
[  232.664234] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:26:04 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c)

03:26:04 executing program 3:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c)
r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400000, 0x0)
write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7)
bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c)
ioctl$TIOCVHANGUP(r0, 0x5437, 0x0)
getsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=<r1=>0x0, &(0x7f0000000340)=0x4)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={<r2=>r1, @in6={{0xa, 0x4e20, 0x2, @mcast1, 0x80000000}}, 0x1f, 0x81}, &(0x7f00000003c0)=0xfffffffffffffff0)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r2, 0xfaf5}, &(0x7f0000000200)=0x8)

03:26:04 executing program 2:
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xff0000000000000, 0x4000)
getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x8, 0x12, {0x0, 0x0, 0x0, 0x11}}]}, 0x24}}, 0x0)

03:26:04 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

03:26:04 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:04 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:04 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4)
connect$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x1c)
r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0)
ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000140)={0x0, 0xf2, 0x7fff, &(0x7f0000000100)=0x5})
write$P9_RSYMLINK(r0, &(0x7f00000000c0)={0x14, 0x11, 0x1, {0x2, 0x0, 0x1}}, 0x14)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x21)
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00)

03:26:04 executing program 3:
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0)
ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080))
r1 = socket(0x10, 0x2, 0xc)
ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f00000000c0))
write(r1, &(0x7f0000000000)="1f000000010aff05fd4354c007f37fff0a0501000800010004000300ffdf00", 0x1f)

03:26:04 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x0, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={<r2=>0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x4, 0x401, 0x302, 0xd45e, 0x8}, &(0x7f0000000040)=0x98)
getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8)
timerfd_settime(r1, 0x1, &(0x7f0000000200), &(0x7f0000000240))
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:04 executing program 2:
r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2000000, 0x0)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0)
ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000100)={0x8001003, 0x7f})
socket$can_raw(0x1d, 0x3, 0x1)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=<r2=>0x0, &(0x7f0000000400)=0x4)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000440)={r2, 0x80}, 0x8)
sched_setattr(0x0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1)
bind$netrom(r0, &(0x7f0000000480)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000380))
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x1f}, &(0x7f0000000300)=0xc)
unshare(0x40000000)
ioctl$NBD_CLEAR_SOCK(r3, 0xab04)
r4 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x404000, 0x0)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000500)={r2, 0x338b}, 0x8)
ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000002c80)=0x9)

[  232.874573] Dev loop1: unable to read RDB block 1
03:26:04 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  232.898675]  loop1: unable to read partition table
[  232.921385] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
[  232.930415] loop1: partition table beyond EOD, truncated
[  232.940709] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  232.951915] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'.
[  232.964426] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:05 executing program 3:
r0 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x1, 0x0)
r1 = socket$kcm(0x2, 0x4000000002, 0x73)
connect(r1, &(0x7f0000000080)=@generic={0x0, "b2298a0d07a150d9a3ac5babe1f58429c390d0c32be9adbefd7c7bc2cdab4065835155846a924d4333c055d7ad461ae82b823a90b23ee0e250b6246f107dc14c82ab8b61c6af885b065e88bef8c63dc33fb7053b9a7c2080200684134e454b01e15674444f4f2f67097899fe9786275c1537ff96a850c5e913df63477172"}, 0x3a)
ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc4c85513, &(0x7f0000001480)={{0x7, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0})

[  232.975183] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  232.976373]  loop4: p1[EZD]
[  233.016361] loop4: p1 size 2047 extends beyond EOD, truncated
[  233.066326] Dev loop5: unable to read RDB block 1
03:26:05 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:05 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

[  233.092332]  loop5: unable to read partition table
03:26:05 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x0, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={<r1=>0x0, 0x6, 0x2}, &(0x7f0000000040)=0xc)
setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0)={r1, 0x8}, 0x8)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:05 executing program 3:
r0 = socket$can_bcm(0x1d, 0x2, 0x2)
connect$can_bcm(r0, &(0x7f0000000000), 0x10)
r1 = dup(r0)
recvfrom$rxrpc(r1, &(0x7f0000000540)=""/94, 0x5e, 0x1, &(0x7f00000005c0)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x5, @local, 0x10000}}, 0x24)
sendmsg$can_bcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="0500"/16, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}}, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', <r2=>0x0})
sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000340)={0x5, 0x0, 0x0, {0x77359400}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "eea9a76841849d7d"}}, 0x48}}, 0x0)
r3 = request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000440)='vcan0\x00', 0x0)
keyctl$get_security(0x11, r3, &(0x7f0000000480)=""/176, 0xb0)
sendmsg$can_bcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x6, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "afad0ba330c263d0"}}, 0x48}}, 0x0)

[  233.135031] loop5: partition table beyond EOD, truncated
[  233.174962] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:05 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  233.231931] Dev loop1: unable to read RDB block 1
[  233.251489]  loop1: unable to read partition table
[  233.267810] loop1: partition table beyond EOD, truncated
[  233.299391] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  233.314224] IPVS: ftp: loaded support on port[0] = 21
03:26:05 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x3)
connect$caif(r1, &(0x7f00000000c0)=@rfm={0x25, 0x9, "58c2b8da9db269362262c530204db2dd"}, 0x18)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
syz_init_net_socket$x25(0x9, 0x5, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
connect$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x7a, 0x3, 0x0, 0x606d1c6e, 0xfff}, 0x401}, 0xa)
ioctl$int_out(r0, 0x5462, &(0x7f0000000000))

[  233.360814] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:26:05 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  233.409340] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  233.416280] Dev loop5: unable to read RDB block 1
[  233.426304]  loop5: unable to read partition table
[  233.435690] loop5: partition table beyond EOD, truncated
[  233.440598]  loop4: p1[EZD]
[  233.447537] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[  233.474441] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:05 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:05 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  233.623411] Dev loop1: unable to read RDB block 1
[  233.629283]  loop1: unable to read partition table
[  233.645614] loop1: partition table beyond EOD, truncated
[  233.651980] Dev loop5: unable to read RDB block 1
[  233.657053]  loop5: unable to read partition table
[  233.662866] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  233.676062] loop5: partition table beyond EOD, truncated
[  233.697662] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:06 executing program 2:
r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2000000, 0x0)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0)
ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000100)={0x8001003, 0x7f})
socket$can_raw(0x1d, 0x3, 0x1)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=<r2=>0x0, &(0x7f0000000400)=0x4)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000440)={r2, 0x80}, 0x8)
sched_setattr(0x0, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYBLOB="c40000008098067a3d821b9794cd9d7b7ce17db1673006392502a3fba7c02d229a11c13186670065710f832b8c82ac398f14361142de338a69abf3a8e18dfe3c322ca4b546fd3625221bcceb174a1886946f995bfbad26d4defb51835fe99a36b55793f8f22f7e3f3080c508aef589954f789b6846ca3157d682847209f925f300a4e966e73dbd5ed505bfb6e36d331a616d412d12183238f2f670bb6837097992c01efb2ca0cf1a1a10411d7cae3f2b4a3400a0a1f944c808f3dd157d887d5fda1965195f9300009be3c2833ce0c5928f35840a3078de2c4c46633215851a6e0670fe819046dcdcbaafc57f01cc8b804f9e27428d6707dc0ca735a68fc1f8d80a38c04b9ee34d8015c6f047e5f154eff7e0c233"], &(0x7f0000000080)=0x1)
bind$netrom(r0, &(0x7f0000000480)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000380))
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x1f}, &(0x7f0000000300)=0xc)
unshare(0x40000000)
ioctl$NBD_CLEAR_SOCK(r3, 0xab04)
r4 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x404000, 0x0)
setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000500)={r2, 0x338b}, 0x8)
ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000002c80)=0x9)

03:26:06 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
write$selinux_access(r1, &(0x7f0000000200)={'system_u:object_r:var_lock_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x4}, 0x63)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x68040, 0x0)
ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f00000000c0)={0x6, @output={0x1000, 0x0, {0x7500000000, 0x3397}, 0x1}})

03:26:06 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

03:26:06 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:06 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:06 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070")
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, 0x11, 0x9, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x1}, [@typed={0x8, 0x1, @fd=r1}, @typed={0x8, 0x2, @binary="84"}]}, 0x24}}, 0x0)
r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={<r3=>0x0, 0x9}, &(0x7f0000000140)=0x8)
recvfrom$llc(r2, &(0x7f0000000200)=""/166, 0xa6, 0x2062, &(0x7f00000002c0)={0x1a, 0x8, 0x7fff, 0x4, 0x3ff, 0x106, @dev={[], 0x1d}}, 0x10)
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r3, 0x3ff, 0x6}, &(0x7f00000001c0)=0x8)

[  234.309559] QAT: Invalid ioctl
03:26:06 executing program 3:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200000, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7d, 0x0, [0x4b564d03], [0xc1]})

[  234.336207] QAT: Invalid ioctl
03:26:06 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f00000000c0)="e9ca445aa71ba25d02dcbaf9c0d363a7daed1bde24a918628cb738d48ac22a744aae00a196f4fdc00c4689b3e2b457adf6012fd74a75196e32b9a97fedf0a4686dc67884e6110b350ef2ca30899636858757d8721d625cd85b97d4a79722326ef8ece2697a1515cb4cfeb5c3eeebd4ed967ea2fbe97da72181d9c027fc93394da5dda9f5a520e09bbc6edc8e25294a571cf27639c8f10be4cfd23f909b920299873c5f7c8ce601304a213f6af81d874f822aee9870ac204f06bb5d3e78768acf164987b86012448bd1ccab7f", 0xcc, 0xfffffffffffffffd)
keyctl$set_timeout(0xf, r1, 0x9)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
r2 = socket(0x1b, 0x0, 0x80)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={<r3=>0x0, 0x4}, &(0x7f0000000200)=0x8)
setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000400)={r3, @in6={{0xa, 0x4e24, 0x10001, @dev={0xfe, 0x80, [], 0x25}, 0x4}}}, 0x84)
setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e24, 0xe0, @loopback, 0x1000}}}, 0x84)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

[  234.413461] Dev loop1: unable to read RDB block 1
[  234.426523]  loop1: unable to read partition table
[  234.447711] loop1: partition table beyond EOD, truncated
[  234.461051] Dev loop5: unable to read RDB block 1
[  234.466379]  loop5: unable to read partition table
[  234.484004] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  234.489542] loop5: partition table beyond EOD, truncated
03:26:06 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000080)={'syz1\x00'}, 0x45c)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1)
ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x38)
ioctl$UI_DEV_CREATE(r0, 0x5501)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sessionid\x00')
sendmsg$tipc(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000500)="a40e1ffa011f85ab5d0b6a37f20c328c03eba746be8f9e6c192c9143983f2c380372902404ca36d4d420601a5bd11c0ffc51f422a162ea3b9bc2f55c79cf7d930f3835122920798c6b70af3015f419927edbffba0fd3a64a1c9b6d358b68e954c7e01508a8ba07ef5ccda47f8aeca9363c227156fdf30c90a254f83751f799fc2ecf5c4c7fd5965b917808c5511da6586772d3ffdeed76f8fd0c1aed254296380dcf26e4f2f22b418500d51742f059e011a0eb4385dc", 0xb6}, {&(0x7f0000000040)="e4f22d17863a02ed948775bfdead463dccf400c6472507c2a7ba90a665d64ed3376a919547aec2359573921c5e", 0x2d}, {&(0x7f00000005c0)="e3570f0617b17a510e8e1aa19d3927220d46d78eea73c39d865796ba6d7b2eacc7a66b6ece138c64cca49eadc3037f1df5c479284de2bc2f331b9023d6376f74c16c3a53fb8a8c3d1f445453c6539f56aeaee2f8dccf60810c4b65932f", 0x5d}], 0x3, &(0x7f0000000680)="bf7451b8236edef0d210e3ff962d2e512a15e09e6b18a5188fb6f029f19937c644222760e0c1253727c068beed0ee594f65a35d738b1e9fb1d2dbc0d2e47ec577e957775cc748f6d58796d60deaf8eea15f2808262fb26cd026ee7a4d5d6dca17bed9d0fd69c9ed7a296274a9b59", 0x6e, 0x40}, 0x4000000)
ioctl$UI_DEV_DESTROY(r0, 0x5502)

[  234.511776] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  234.516586] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:06 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  234.557983] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:06 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:06 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  234.602018]  loop4: p1[EZD]
[  234.606860] input: syz1 as /devices/virtual/input/input5
[  234.627906] loop4: p1 size 2047 extends beyond EOD, truncated
[  234.721504] Dev loop1: unable to read RDB block 1
[  234.735203]  loop1: unable to read partition table
[  234.741166] loop1: partition table beyond EOD, truncated
[  234.781390] Dev loop5: unable to read RDB block 1
[  234.781503] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  234.786321]  loop5: unable to read partition table
[  234.786382] loop5: partition table beyond EOD, 
[  234.808929] input: syz1 as /devices/virtual/input/input6
[  234.817055] truncated
[  234.819629] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:26:07 executing program 2:
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000380)='comm\x00')
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
r2 = socket(0x10, 0x80002, 0x0)
r3 = creat(0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2)
r4 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getsockopt$inet_mreqsrc(r4, 0x0, 0x0, 0x0, 0x0)
unshare(0x400)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0)
shutdown(0xffffffffffffffff, 0x0)
fchown(r3, 0x0, 0x0)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000100)="0a617e09c26a9c995b09e802e25a6eafecc53e5b403a7f976e174ae3563c079c63955c6ed3f29b436c5c07bfeebe998e305a5285ba83588f49f3e5", 0x3b}], 0x1, 0x8)
semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000001}, {0x0, 0x5, 0x800}], 0x2, &(0x7f0000000900))
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0)
ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_ADD(r4, 0x4c80, r6)
shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000)

03:26:07 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:07 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x4, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=<r1=>0x0)
syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x40000)
move_pages(r1, 0x7, &(0x7f0000000040)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil], &(0x7f00000000c0)=[0x401], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:07 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:07 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:07 executing program 3:
r0 = creat(&(0x7f0000000300)='./file0\x00', 0x4)
ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x1, 0x4, 0x3, {0x3, @sliced={0x2, [0x3, 0x8000, 0x80000001, 0xdb2d, 0x8c, 0x5, 0x3, 0x1, 0x4, 0x7, 0x6, 0x0, 0xab17, 0x5, 0x15, 0x1b40000000000000, 0x5, 0xfffffffffffffff9, 0x6, 0x2, 0x9, 0x0, 0x1f, 0x1f, 0xfffffffffffffffc, 0x9, 0x101, 0x7ff, 0x2, 0x400, 0x0, 0x0, 0x8, 0x100000000, 0x2, 0x10001, 0x10001, 0x8, 0x80, 0x3ff, 0x2, 0x6, 0x6, 0x0, 0x4, 0x10000, 0x101, 0x1000], 0x5}}})
r1 = dup(0xffffffffffffffff)
getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f00000002c0)=0x4)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040)="4b21c9f3286024b0e97bc0bb877997c50d438b0f5df30e12bf29fdf4560e56beb6640ad8a0bce2c8a22a93", &(0x7f0000000080)=""/220}, 0x18)
bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x1810}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48)

03:26:07 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x0)
setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240), 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$can_raw(0x1d, 0x3, 0x1)
mount$9p_xen(&(0x7f0000000000)='@em0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x10, &(0x7f0000000100)={'trans=xen,', {[{@cache_none='cache=none'}, {@afid={'afid', 0x3d, 0xffffffff}}, {@debug={'debug', 0x3d, 0x6}}, {@version_L='version=9p2000.L'}], [{@obj_user={'obj_user', 0x3d, '!\\proc)keyring.proc]'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, 'user'}}]}})
dup3(r1, r0, 0x0)

03:26:07 executing program 3:
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001640)=ANY=[@ANYRES32, @ANYRESDEC, @ANYRES64, @ANYRESOCT, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="bf0fba5fe8b4c5a5e6bf24c486f2672086f854c8d393219c999734e7c7e9fd11b16905cf5aa21fdd81247cfe0acc31025dd8ebe0d503780baff2df3fe9", @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="67414e43b1eed0633a38c95605af8864e8cc7ed5638130131c9c4953fcca52b3baf966dc783b332725b7b66cff67354889d5a47549093e3c1f8c1c423fe671ef11b6ad22c225ac5cd99f4a3b6edae0a3fc935422daa9a86e49a03ee4c2943b29f8cc39502a0ed2abc8ad99c7b4330d88e63b31737048662441f14ec4d6c7f6c440e253918cd2d20d3f6792cd83b1f02e8d24ba1e57d738c5714409d0a4412ba2e2e8df06d1d03a61454e8bc472d7828b38e3", @ANYPTR, @ANYBLOB="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", @ANYRESDEC, @ANYPTR], @ANYRES16, @ANYRESDEC], @ANYRESOCT, @ANYBLOB="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", @ANYPTR64=&(0x7f0000001440)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES16, @ANYRESDEC], @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESOCT, @ANYPTR, @ANYRES16], @ANYRESHEX, @ANYRES16, @ANYRESOCT, @ANYPTR, @ANYRES32, @ANYRES16, @ANYRES32, @ANYRESHEX], @ANYPTR=&(0x7f0000001580)=ANY=[@ANYRES16, @ANYBLOB="c22d9b36bc953f89357fce727d5b7d56c46f3ba2bfd7868c5a76e4fb24779d79328c65670c0d371b", @ANYPTR64=&(0x7f00000014c0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYRES64, @ANYBLOB="584fe92ac3e15a7da51d15bf6eeb9ff47756417b25d3db721ee789a43149", @ANYPTR], @ANYRESOCT, @ANYRESOCT, @ANYBLOB="b173bb63c18fe44791add4381d8ff4888736f910c062be5b3c44450cbf0552d451865c08f9cc3d39bd", @ANYPTR64, @ANYRES64, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESHEX], @ANYPTR=&(0x7f0000001540)=ANY=[@ANYRESDEC, @ANYPTR, @ANYRES32, @ANYPTR]], @ANYRESHEX], 0xa}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0xc800)
r0 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x38)
ptrace$cont(0x18, r1, 0x0, 0x0)
ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r1, 0x0, 0x0)

[  235.240945] Dev loop1: unable to read RDB block 1
[  235.245978]  loop1: unable to read partition table
[  235.276552] loop1: partition table beyond EOD, truncated
03:26:07 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  235.305774] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:26:07 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x101000)

[  235.351376] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  235.383855] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  235.396514]  loop4: p1[EZD]
[  235.406546] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:07 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:07 executing program 2:
r0 = getpid()
prctl$PR_SET_PTRACER(0x59616d61, r0)
r1 = getpid()
r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78)
ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000080)=r1)
prctl$PR_SET_PTRACER(0x59616d61, r1)

03:26:07 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:07 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000000)=[0x5755bb4, 0x8, 0x6, 0x5], 0x4, 0x8, 0x6, 0x9, 0xfff, 0x7e97, {0xfffffffffffffffb, 0x4, 0x4000000000000000, 0xffffffff, 0x4, 0x5, 0xfff, 0x0, 0xfffffffffffffff7, 0x6a6, 0x9, 0xd57, 0x7, 0x400, "4ba03dfea8063dbb7bf5716da6603c89e9ecc313b7e893bba5fb9e78cd66cac7"}})
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0)
getpeername$netlink(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xc)
setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e20, @empty}, 0x10)
socket$rds(0x15, 0x5, 0x0)

03:26:07 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\a\x00\x00\x00\x00\x00\x00\x00'], 0xda00)
r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8)
sendto$packet(r3, &(0x7f0000000080), 0x0, 0x8011, &(0x7f0000000340)={0x11, 0x1c, r4, 0x1, 0x8}, 0x14)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(0x0, 0x0, 0x0)
getegid()
stat(0x0, 0x0)
stat(0x0, 0x0)
getresgid(&(0x7f0000007340), 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_int(r2, &(0x7f0000000200), 0x43400)

03:26:07 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  235.662580] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  235.672888] Dev loop1: unable to read RDB block 1
[  235.679588]  loop1: unable to read partition table
[  235.688158] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  235.695927] loop1: partition table beyond EOD, truncated
[  235.706858]  loop4: p1[EZD]
03:26:07 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
write$binfmt_elf32(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x6, 0x800, 0x100, 0x2, 0x2, 0x7, 0x40, 0x3e1, 0x38, 0x39d, 0x8001, 0x6, 0x20, 0x1, 0x0, 0x1ff, 0x40}, [{0x4, 0xfffffffffffffffa, 0x7, 0x10000, 0x0, 0x73fd, 0x8000, 0x4}, {0x70000000, 0x2, 0x4, 0x2, 0xffffffff, 0x3ff, 0xcb, 0x7fffffff}], "2e9cfb39ce8b4c8d7d9db28934ad67f3c1799e4d402f54862c033ed5121a0945f170dc71d7603cf096dc4381a3a199eaba1684cabc5ebf8f60daf36ed7b4c2562c211eac3c6760d0a004d18374e2bd8145ae32b46a02073f9677649e67cbfe8953191940db321d1c80c11e36238f2cc805682b6d4ca37c1ce075f546dbe56d9a3db85f03862ff5c2488580e802d4f4ff43f5a458827c67797cbd2a83cd07ea423ccf03ed148943b6c9c649773f434476533d055695771f8e7705c4b2922482df486d541ebebf15161c4c33216c7368cffda87862ae410db2a618", [[]]}, 0x252)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:07 executing program 2:
r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0xf169, 0xe3})

[  235.712525] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  235.724437] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:07 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  236.051290] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  236.071876] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  236.095137]  loop5: p1[EZD]
[  236.098784] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:10 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x385}}], 0x1, 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/anycast6\x00')
preadv(r1, &(0x7f00000017c0), 0x333, 0x3c)

03:26:10 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:10 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0xc)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0xf7, 0x8, 0x4, 0x9}, {0x3, 0xfff, 0x5, 0x27}, {0x7, 0x5, 0x9, 0x3}, {0x8001, 0x8, 0x4, 0xa99}, {0xfffffffffffffffb, 0x46, 0x4, 0xfffffffffffffffb}, {0xa588, 0x8000, 0xe37, 0x1000}, {0x8dc, 0x10000, 0x3ff, 0x8}, {0x9c8, 0x7, 0x20, 0x5}]}, 0x10)
getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r1, &(0x7f0000000180)={0xa, 0x104e23, 0x2, @mcast1, 0xffffffff}, 0xfffffffffffffd17)

03:26:10 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:10 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00')
preadv(r1, &(0x7f0000001ac0)=[{0x0}, {&(0x7f0000001a00)=""/148, 0x94}], 0x2, 0x3c)

03:26:10 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:10 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x95, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:10 executing program 2:
r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0)
r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x200000, 0x0)
fcntl$dupfd(r1, 0x406, r0)

03:26:10 executing program 0:
socketpair(0xd, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140)={0x9, 0x10001, 0x1f, 0x4, 0x7f, 0x8, 0x8, 0x2, 0x7, 0x7, 0x49}, 0xb)
r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3f, 0x10900)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x3, @local}, @in6={0xa, 0x4e23, 0x81, @dev={0xfe, 0x80, [], 0xb}}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e22, @loopback}], 0x68)
r2 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000280)}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet6_buf(r1, 0x29, 0xca, &(0x7f0000000340)="b33ed0a55385b2424e51636c767bebba70158739f36db6d78a630f0064cdf5d6811864138c6cfdcc4a525838ace9bc8e6e2d762c6c70f7fb90436c060a95ab0fb06b3ad66d01cf8ce3ae952acaadb4c0d2cd88f36c791b4647b7a44f3199d6e28bc304f0", 0x64)
connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00')
sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf1}]}, 0x12}, 0x1, 0x0, 0x0, 0x3ffd}, 0x40)

03:26:10 executing program 3:
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x385}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='stack\x00')
preadv(r0, &(0x7f00000017c0), 0x333, 0x0)

[  238.470849] Dev loop1: unable to read RDB block 1
[  238.475881]  loop1: unable to read partition table
[  238.497747] loop1: partition table beyond EOD, truncated
[  238.513571] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:26:10 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
sendfile(r1, r0, 0x0, 0x10013c93e)

[  238.540753] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  238.559082] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  238.570460]  loop4: p1[EZD]
[  238.575045] loop4: p1 size 2047 extends beyond EOD, truncated
[  238.604610] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  238.604620] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:10 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  238.684821]  loop5: p1[EZD]
03:26:10 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")

03:26:10 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
sendfile(r1, r0, 0x0, 0x10013c93e)

03:26:10 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xafc0}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
lseek(r0, 0x0, 0x0)

[  238.708874] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:10 executing program 3:
r0 = syz_open_procfs(0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={0x0, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x0, @multicast1}}}, 0x108)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8)
prctl$PR_GET_NAME(0x10, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc)
syslog(0x9, 0x0, 0x0)
sendmmsg$unix(r0, &(0x7f0000004c80)=[{&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000000000000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x6e, 0x90}, {&(0x7f0000000a00)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x804}], 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)

03:26:10 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000001c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8', &(0x7f0000000180)=@chain={'key_or_keyring:', 0x0, ':chain\x00'})
close(0xffffffffffffffff)

03:26:10 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  238.856275] Dev loop1: unable to read RDB block 1
[  238.868968]  loop1: unable to read partition table
03:26:11 executing program 0:
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)

03:26:11 executing program 2:
getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2)
r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00')
preadv(r1, &(0x7f00000017c0), 0x199, 0x0)

[  238.894706] audit: type=1400 audit(1564716370.945:70): avc:  denied  { syslog } for  pid=12572 comm="syz-executor.3" capability=34  scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1
[  238.908382] loop1: partition table beyond EOD, 
[  238.949690] truncated
[  238.953677] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  238.965340] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'.
[  238.983431] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  239.014690] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  239.053510]  loop4: p1[EZD]
03:26:11 executing program 3:
r0 = syz_open_procfs(0x0, 0x0)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={0x0, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x0, @multicast1}}}, 0x108)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8)
prctl$PR_GET_NAME(0x10, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc)
syslog(0x9, 0x0, 0x0)
sendmmsg$unix(r0, &(0x7f0000004c80)=[{&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000000000000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x6e, 0x90}, {&(0x7f0000000a00)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x804}], 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)

03:26:11 executing program 0:
r0 = socket$inet6_sctp(0xa, 0xfffffffffffffffd, 0x84)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x26}]}, 0x10)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00')
getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f00000000c0)=""/103, &(0x7f0000000040)=0x67)

03:26:11 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  239.078280] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:11 executing program 3:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0)
r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, 0x0, 0x0)

[  239.165716] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'.
[  239.183288] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:26:11 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")

03:26:11 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
sendfile(r1, r1, 0x0, 0x6)

[  239.262168] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:11 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000100), 0x12)

[  239.324439] Dev loop1: unable to read RDB block 1
[  239.336549]  loop1: unable to read partition table
[  239.343350]  loop5: p1[EZD]
03:26:11 executing program 2:
r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9)

[  239.367470] loop5: p1 size 2047 extends beyond EOD, truncated
[  239.379985] loop1: partition table beyond EOD, truncated
03:26:11 executing program 0:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
get_robust_list(0x0, 0x0, &(0x7f0000000380))
ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)={0x8})
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc)
write$P9_RSTATFS(r0, &(0x7f00000003c0)={0x43, 0x9, 0x2, {0x16, 0x289dd3cf, 0x0, 0x40, 0x3, 0x2, 0x2, 0x81}}, 0x43)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000340)='./file0\x00', 0xffffffffffffffff)
write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f)
clock_gettime(0x0, &(0x7f0000000100))
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_int(r2, &(0x7f0000000140), 0xffffff35)

[  239.419696] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:26:11 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:11 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0)
ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0)

03:26:11 executing program 2:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0)

03:26:11 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  239.522241] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  239.538953] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  239.601763]  loop4: p1[EZD]
[  239.634687] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:11 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")

[  239.701664] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  239.713034] Dev loop1: unable to read RDB block 1
[  239.730402]  loop1: unable to read partition table
[  239.745915] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:11 executing program 3:
r0 = gettid()
semget$private(0x0, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)
timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040))
umount2(0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0)
pause()
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0)
ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0xd4e)
openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80, 0x0)
memfd_create(0x0, 0x0)
setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
tkill(r0, 0x13)

[  239.753190] loop1: partition table beyond EOD, truncated
[  239.776139] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  239.790169]  loop5: p1[EZD]
03:26:11 executing program 2:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0)

[  239.804716] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:11 executing program 2:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0)

03:26:12 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:12 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  239.931393] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  239.984444] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  240.010962]  loop4: p1[EZD]
[  240.023379] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:12 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")

[  240.131329] Dev loop1: unable to read RDB block 1
[  240.136255]  loop1: unable to read partition table
[  240.170794] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  240.187435] loop1: partition table beyond EOD, truncated
[  240.200569] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  240.205732] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  240.231792]  loop5: p1[EZD]
[  240.250778] loop5: p1 size 2047 extends beyond EOD, truncated
[  240.390177] audit: type=1804 audit(1564716372.435:71): pid=12722 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir537833909/syzkaller.kigBqY/169/file0/file0" dev="sda1" ino=16960 res=1
[  240.440898] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  240.457520] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  240.471949]  loop4: p1[EZD]
[  240.479014] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:12 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x0, 0x0)
preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc31}], 0x10, 0x9)

03:26:12 executing program 2:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0)

03:26:12 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:12 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:12 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")

03:26:12 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0)
io_setup(0x83, &(0x7f00000003c0)=<r2=>0x0)
r3 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300))
mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0)
fcntl$setstatus(r1, 0x4, 0x44800)
io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000, 0x8000000}])

[  240.660970] Dev loop1: unable to read RDB block 1
[  240.666000]  loop1: unable to read partition table
[  240.685011] loop1: partition table beyond EOD, truncated
03:26:12 executing program 2:
syz_genetlink_get_family_id$tipc2(0x0)
setfsgid(0x0)
r0 = creat(0x0, 0xffffffffffffffff)
write$cgroup_type(r0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35)

[  240.712405] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  240.740671] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:26:12 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  240.761544] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  240.779712]  loop5: p1[EZD]
[  240.797067] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:12 executing program 3:
shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000)
mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000)
mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000)

[  240.835201] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  240.861992] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:12 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

[  240.909015]  loop4: p1[EZD]
[  240.918278] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:13 executing program 3:
r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil)
shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000)
mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000)
mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000)

[  240.970966] loop_reread_partitions: partition scan of loop4 () failed (rc=-16)
[  240.993791] Dev loop1: unable to read RDB block 1
[  240.998797]  loop1: unable to read partition table
[  241.006628] print_req_error: 403 callbacks suppressed
[  241.006633] print_req_error: I/O error, dev loop4, sector 1
03:26:13 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")

[  241.031997] print_req_error: I/O error, dev loop4, sector 1
[  241.037760] buffer_io_error: 400 callbacks suppressed
[  241.037767] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  241.050962] print_req_error: I/O error, dev loop4, sector 5
[  241.056719] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  241.071886] print_req_error: I/O error, dev loop4, sector 1
[  241.077646] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  241.085329] print_req_error: I/O error, dev loop4, sector 5
[  241.091103] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  241.098558] print_req_error: I/O error, dev loop4, sector 1
[  241.104372] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  241.115663] print_req_error: I/O error, dev loop4, sector 5
[  241.121516] Buffer I/O error on dev loop4p1, logical block 1, async page read
03:26:13 executing program 0:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x0, 0x0)
inotify_add_watch(r0, &(0x7f0000000200)='./bus\x00', 0x42)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, <r1=>0x0}, &(0x7f0000000440)=0xc)
quotactl(0x9, &(0x7f00000003c0)='./bus\x00', r1, &(0x7f0000000bc0)="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")
r2 = socket$inet6(0xa, 0x400000000001, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000580400003801000038010000780200", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/62], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000fec600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c8001001000000000000000000000000000000000000000000000000480049444c4554494d45520000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffe0000001fe8000000000000000000000000000aaffffffffffffffffffffffff00000000000000ff00000000ffffff000000000076657468315f746f5f626f6e64000000687773696d3000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000800000000000000000000000000000000000f0001801000000000000000000000000000000000000000004000000280065756936340000000000000000000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180160010000000000000000000000000000000000000000000000002800697076366865616465720000000000000000000000000000000000000000228f010000000000280069636d7036000000000000000000000000000000000000000000000000000001600000000000480049444c4554494d45520000000000000000000000000000000000000000000300000073797a3000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000098e91b"], 0x3)
setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000006c0)=@hopopts={0x5e, 0x4, [], [@generic, @calipso={0x7, 0x18, {0x7, 0x4, 0xfffffffffffff800, 0x1, [0x1000, 0x0]}}, @pad1, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x30)
getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@empty, @in6=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0x2b7)
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0)
pipe(0x0)
setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000140), 0x4)
bind(r2, &(0x7f0000000180)=@l2={0x1f, 0x9, {0x10000, 0x8000, 0x3, 0xeb59, 0x3ff, 0xbd3}, 0x9, 0x1}, 0x80)
bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x0, 0x0)
r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff)
keyctl$clear(0x7, r4)
sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r5 = open(0x0, 0x141042, 0x0)
write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffde9, 0x37, 0x1, {0x2, 0xfffffffffffffff7, 0x1, 0x0, 0xffffffffffffff99, 'vboxnet0['}}, 0x27)
ftruncate(r5, 0x80003)
sendfile(r2, r5, &(0x7f00000000c0), 0x8000fffffffe)
syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)

03:26:13 executing program 3:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
get_robust_list(0x0, 0x0, &(0x7f0000000380))
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, <r1=>0x0}, &(0x7f00000000c0)=0xc)
write$P9_RSTATFS(r0, &(0x7f00000003c0)={0x43, 0x9, 0x2, {0x16, 0x289dd3cf, 0x0, 0x40, 0x3, 0x2, 0x2, 0x81}}, 0x43)
setfsgid(r1)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
fchdir(r0)
r2 = creat(&(0x7f0000000340)='./file0\x00', 0xffffffffffffffff)
write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0x76656f)
clock_gettime(0x0, &(0x7f0000000100)={0x0, <r3=>0x0})
write$sndseq(0xffffffffffffffff, &(0x7f0000000600)=[{0x4, 0x3, 0x2, 0xc0a8, @time={0x0, r3+30000000}, {0xc48f, 0x85a}, {0x2, 0x1f}, @raw8={"046d030133f0eb847e15c4ad"}}, {0x99, 0x0, 0x1f, 0x2, @time, {0x100, 0x20}, {0x0, 0x9188}, @ext={0x5a, &(0x7f0000000200)="dae4ea57ce85aa285a67de7c1af56bc9d48ed8486340fdf6a45a39ed5f4a7aa1a3cffbe1183c7b48862ca992ec260b2cf57e214582d3bc87c4b14928eee8d3bf76b23f7bab66f3200b2965d975fbae44f320dffd178927f93094"}}, {0x0, 0x0, 0x1, 0x0, @tick=0x7fffffff, {0x1f, 0x77ee4122}, {0x9, 0x5}, @quote={{0x1, 0x2}, 0x7, &(0x7f0000000280)={0xfffffffffffffeff, 0x7, 0x80, 0x8, @tick, {0x0, 0x6}, {0x0, 0x4}, @control={0x1c2e, 0x6, 0x2}}}}, {0x0, 0x3fe00000000, 0xffffffff, 0x10001, @time, {0x7f}, {0x8}, @addr={0x0, 0x3}}, {0x6, 0x0, 0x0, 0x0, @tick=0x37, {0x0, 0x101}, {}, @control}, {0x9, 0x0, 0x100000001, 0x8, @time, {0x4, 0x12}, {0x1, 0x8f51}, @queue={0x5, {0x0, 0x80000001}}}, {0x0, 0x48, 0x4, 0x7fffffff, @tick, {0x0, 0x81}, {0xffffffff, 0x927}, @control}], 0x150)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35)

[  241.129006] print_req_error: I/O error, dev loop4, sector 1
[  241.134829] Buffer I/O error on dev loop4p1, logical block 0, async page read
[  241.142675] print_req_error: I/O error, dev loop4, sector 5
[  241.148449] Buffer I/O error on dev loop4p1, logical block 1, async page read
[  241.162326] loop1: partition table beyond EOD, truncated
[  241.207690] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  241.252132] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  241.277820] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:13 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  241.301952] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  241.336141]  loop5: p1[EZD]
03:26:13 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @loopback}, 0xc)
setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)={@multicast2, @loopback, 0x0, 0x1, [@broadcast]}, 0x14)
setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000231000)={@multicast2, @loopback, @broadcast}, 0xc)

[  241.354422] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  241.362257] loop5: p1 size 2047 extends beyond EOD, truncated
[  241.417747]  loop4: p1[EZD]
[  241.442062] loop4: p1 size 2047 extends beyond EOD, truncated
03:26:13 executing program 0:
syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB='norgrplvb,noacl,nosuiddir,statfs_quantum=-'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)

03:26:13 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

[  241.511358] Dev loop1: unable to read RDB block 1
[  241.516544]  loop1: unable to read partition table
[  241.556216] loop1: partition table beyond EOD, truncated
[  241.620401] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  241.652136] gfs2: not a GFS2 filesystem
03:26:13 executing program 2:
shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000)
mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000)
shmctl$SHM_LOCK(0x0, 0xb)
shmctl$SHM_UNLOCK(0x0, 0xc)

03:26:13 executing program 4:
r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0)
read(r0, 0x0, 0x3)
r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0)
r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0)
dup2(r1, r2)

03:26:13 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  241.741506] gfs2: not a GFS2 filesystem
03:26:13 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x4}, 0x1c)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
sendmmsg(r0, &(0x7f0000000140), 0x4000000000001fc, 0x1f00)

03:26:13 executing program 4:
r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil)
shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000)
shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x4003)
mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000)

[  241.890914] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  241.900594] Dev loop1: unable to read RDB block 1
[  241.905572]  loop1: unable to read partition table
[  241.914574] audit: type=1804 audit(1564716373.965:72): pid=12877 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir103047400/syzkaller.fTGElE/240/file0/file0" dev="loop3" ino=13 res=1
[  241.937044] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  241.947823] loop1: partition table beyond EOD, truncated
[  241.960915] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  241.980775]  loop5: p1[EZD]
03:26:14 executing program 4:
r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$getflags(r0, 0x401)

[  241.987935] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:14 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

03:26:14 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x11, r1, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0)

03:26:14 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:14 executing program 4:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETVERSION(r0, 0x80044944, &(0x7f0000000400))

03:26:14 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca"])
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

03:26:14 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x1c, 0x20000000000036, 0x11d, 0x0, 0x0, {0x4801}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0)

03:26:14 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0)
ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000280))

03:26:14 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6)
ioctl$KDADDIO(r0, 0x8910, 0x70e000)

03:26:14 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
fchmod(r0, 0x0)

[  242.241177] Dev loop1: unable to read RDB block 1
[  242.246296]  loop1: unable to read partition table
03:26:14 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070")
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0xb, 0xffffffffffffffff}, 0x14}}, 0x0)

03:26:14 executing program 0:
r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
read(r0, &(0x7f0000000440)=""/71, 0x47)

03:26:14 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x385}}], 0x1, 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/rt6_stats\x00')
preadv(r1, &(0x7f00000017c0), 0x333, 0x0)

[  242.285643] loop1: partition table beyond EOD, truncated
[  242.325480] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  242.345054] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  242.386452] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  242.428985]  loop5: p1[EZD]
[  242.446181] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:14 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

03:26:14 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0)
r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000100)="c6ef157d03adc9514c2e41a8bf390239054af9caf1a3f5b0", 0x2c4, 0xfffffffffffffffe)
r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000400)={r2, r1, r2}, &(0x7f0000002700)=""/83, 0xfffffffffffffe43, 0x0)

03:26:14 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:14 executing program 2:

03:26:14 executing program 0:

03:26:14 executing program 3:

03:26:14 executing program 2:

03:26:14 executing program 0:

03:26:14 executing program 3:

03:26:14 executing program 0:

03:26:14 executing program 3:

03:26:14 executing program 2:

[  242.724894] Dev loop1: unable to read RDB block 1
[  242.731066]  loop1: unable to read partition table
[  242.758569] loop1: partition table beyond EOD, truncated
[  242.765657] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  242.789966] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  242.799870] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  242.826064]  loop5: p1[EZD]
[  242.837890] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:15 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

03:26:15 executing program 4:

03:26:15 executing program 3:

03:26:15 executing program 0:

03:26:15 executing program 2:

03:26:15 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:15 executing program 3:

03:26:15 executing program 2:

03:26:15 executing program 0:

03:26:15 executing program 4:

03:26:15 executing program 3:

03:26:15 executing program 2:

[  243.161748] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  243.205247] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  243.231215] Dev loop1: unable to read RDB block 1
[  243.236689]  loop1: unable to read partition table
[  243.248154]  loop5: p1[EZD]
[  243.273392] loop1: partition table beyond EOD, truncated
[  243.279407] loop5: p1 size 2047 extends beyond EOD, truncated
[  243.284452] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:26:15 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

03:26:15 executing program 3:

03:26:15 executing program 0:

03:26:15 executing program 4:

03:26:15 executing program 2:

03:26:15 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:15 executing program 4:

03:26:15 executing program 2:
perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})

03:26:15 executing program 3:

03:26:15 executing program 0:

03:26:15 executing program 4:

03:26:15 executing program 3:

[  243.493210] Dev loop1: unable to read RDB block 1
[  243.498194]  loop1: unable to read partition table
[  243.543307] loop1: partition table beyond EOD, truncated
[  243.571380] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  243.577254] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  243.588634] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  243.608861]  loop5: p1[EZD]
[  243.619742] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:15 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:15 executing program 2:

03:26:15 executing program 0:

03:26:15 executing program 3:

03:26:15 executing program 4:

03:26:15 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:15 executing program 3:

03:26:15 executing program 4:

03:26:15 executing program 2:

03:26:15 executing program 3:

03:26:15 executing program 0:

03:26:15 executing program 4:

[  243.831280] Dev loop1: unable to read RDB block 1
[  243.845311]  loop1: unable to read partition table
[  243.877105] loop1: partition table beyond EOD, truncated
[  243.915614] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[  243.965370] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  243.979318] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  244.004512]  loop5: p1[EZD]
[  244.008889] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:16 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:16 executing program 2:

03:26:16 executing program 3:

03:26:16 executing program 0:

03:26:16 executing program 4:

03:26:16 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:16 executing program 4:

03:26:16 executing program 2:

03:26:16 executing program 3:

03:26:16 executing program 0:

03:26:16 executing program 4:

03:26:16 executing program 2:

[  244.309213] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  244.332963] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  244.344485]  loop5: p1[EZD]
[  244.348090] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:16 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:16 executing program 2:

03:26:16 executing program 3:

03:26:16 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:16 executing program 0:

03:26:16 executing program 4:

03:26:16 executing program 2:

03:26:16 executing program 3:

03:26:16 executing program 0:

03:26:16 executing program 4:

03:26:16 executing program 2:

03:26:16 executing program 3:

03:26:16 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")

03:26:16 executing program 0:

03:26:16 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:16 executing program 4:

03:26:16 executing program 3:

03:26:16 executing program 2:

[  244.733257] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  244.743692] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  244.749746]  loop5: p1[EZD]
[  244.753647] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:16 executing program 4:

03:26:16 executing program 3:

03:26:16 executing program 2:

03:26:16 executing program 0:

03:26:17 executing program 4:

03:26:17 executing program 0:

[  245.095442] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  245.105379] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  245.112083]  loop5: p1[EZD]
[  245.115432] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:17 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")

03:26:17 executing program 2:
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000001618321efd14cb411c1f2b4e644a27fd40100000677c00000000861a6c040004009d7dd072ac206db44a4a382302cc960b0004ed33ab"], 0x1}}, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x38)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

03:26:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
sendfile(r1, r0, 0x0, 0x10013c93e)

03:26:17 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)
add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff)
read(0xffffffffffffffff, 0x0, 0x0)

03:26:17 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

03:26:17 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:17 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

03:26:17 executing program 2:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

[  245.221653] ptrace attach of "/root/syz-executor.2"[13247] was attempted by "/root/syz-executor.2"[13249]
03:26:17 executing program 4:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

03:26:17 executing program 0 (fault-call:5 fault-nth:0):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  245.410649] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  245.444111] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:17 executing program 3:
r0 = socket(0x840000000015, 0x3, 0x0)
getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f0000000000))

[  245.473901] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  245.497091]  loop1: p1[EZD]
[  245.502772] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  245.508845] FAULT_INJECTION: forcing a failure.
[  245.508845] name failslab, interval 1, probability 0, space 0, times 0
[  245.542991]  loop5: p1[EZD]
[  245.559166] loop5: p1 size 2047 extends beyond EOD, truncated
[  245.569964] CPU: 1 PID: 13284 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  245.577113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  245.586542] Call Trace:
[  245.589173]  dump_stack+0x138/0x19c
[  245.592814]  should_fail.cold+0x10f/0x159
[  245.596956]  should_failslab+0xdb/0x130
[  245.600923]  __kmalloc+0x2f0/0x7a0
[  245.604448]  ? __sb_end_write+0xc1/0x100
[  245.608493]  ? strnlen_user+0x12f/0x1a0
[  245.612449]  ? SyS_memfd_create+0xba/0x3a0
[  245.616666]  SyS_memfd_create+0xba/0x3a0
[  245.620726]  ? shmem_fcntl+0x130/0x130
[  245.624614]  ? do_syscall_64+0x53/0x640
[  245.628571]  ? shmem_fcntl+0x130/0x130
[  245.632439]  do_syscall_64+0x1e8/0x640
[  245.636306]  ? trace_hardirqs_off_thunk+0x1a/0x1c
03:26:17 executing program 2:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

[  245.641131]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  245.646341] RIP: 0033:0x459829
[  245.649510] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  245.657202] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  245.664451] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  245.671726] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000
[  245.678975] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267cf6d4
[  245.686248] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006
03:26:17 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")

03:26:17 executing program 3:
r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4)
sendfile(r0, r0, 0x0, 0xfec)
getpgid(0xffffffffffffffff)
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', <r1=>0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, 0x0)
r3 = socket$inet6(0xa, 0x6, 0x0)
bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1})
ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0)
r4 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r3, 0x6)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0)
setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1)
connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c)
connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)
syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f)
bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0)
setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc)
sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0)

03:26:17 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:17 executing program 0 (fault-call:5 fault-nth:1):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  245.760834] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  245.783604] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:17 executing program 2:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

[  245.816061]  loop4: p1[EZD]
[  245.833101] loop4: p1 size 2047 extends beyond EOD, truncated
[  245.894882] FAULT_INJECTION: forcing a failure.
[  245.894882] name failslab, interval 1, probability 0, space 0, times 0
[  245.947881] CPU: 1 PID: 13311 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  245.955048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  245.964412] Call Trace:
[  245.967009]  dump_stack+0x138/0x19c
[  245.970653]  should_fail.cold+0x10f/0x159
[  245.974810]  should_failslab+0xdb/0x130
[  245.978781]  kmem_cache_alloc+0x2d7/0x780
[  245.982917]  ? __alloc_fd+0x1d4/0x4a0
[  245.986703]  __d_alloc+0x2d/0x9f0
[  245.990145]  ? lock_downgrade+0x6e0/0x6e0
[  245.994288]  d_alloc_pseudo+0x1e/0x30
[  245.998071]  __shmem_file_setup.part.0+0xd8/0x400
[  246.002900]  ? __alloc_fd+0x1d4/0x4a0
[  246.006687]  ? shmem_fill_super+0x8c0/0x8c0
[  246.011004]  SyS_memfd_create+0x1f9/0x3a0
[  246.015155]  ? shmem_fcntl+0x130/0x130
[  246.019033]  ? do_syscall_64+0x53/0x640
[  246.023000]  ? shmem_fcntl+0x130/0x130
[  246.026878]  do_syscall_64+0x1e8/0x640
[  246.030779]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  246.035632]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  246.040809] RIP: 0033:0x459829
[  246.043990] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  246.051694] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  246.058968] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  246.066238] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000
[  246.073508] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267cf6d4
[  246.080775] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000005
03:26:18 executing program 0 (fault-call:5 fault-nth:2):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:18 executing program 3:
r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4)
sendfile(r0, r0, 0x0, 0xfec)
getpgid(0xffffffffffffffff)
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', <r1=>0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, 0x0)
r3 = socket$inet6(0xa, 0x6, 0x0)
bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1})
ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0)
r4 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r3, 0x6)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0)
setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1)
connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c)
connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)
syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f)
bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0)
setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc)
sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0)

[  246.150889] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  246.151354] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  246.163667] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  246.182115]  loop5: p1[EZD]
[  246.185914] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:18 executing program 4:
r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4)
sendfile(r0, r0, 0x0, 0xfec)
getpgid(0xffffffffffffffff)
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', <r1=>0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, 0x0)
r3 = socket$inet6(0xa, 0x6, 0x0)
bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1})
ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0)
r4 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r3, 0x6)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0)
setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1)
connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c)
connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)
syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f)
bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0)
setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc)
sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0)

03:26:18 executing program 2:
r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4)
sendfile(r0, r0, 0x0, 0xfec)
getpgid(0xffffffffffffffff)
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', <r1=>0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, 0x0)
r3 = socket$inet6(0xa, 0x6, 0x0)
bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1})
ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0)
r4 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r3, 0x6)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0)
setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1)
connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c)
connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)
syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f)
bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0)
setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc)
sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0)

[  246.206410] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  246.212855] FAULT_INJECTION: forcing a failure.
[  246.212855] name failslab, interval 1, probability 0, space 0, times 0
[  246.251456] CPU: 1 PID: 13323 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  246.254220]  loop1: p1[EZD]
[  246.258603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  246.258609] Call Trace:
[  246.258628]  dump_stack+0x138/0x19c
[  246.258647]  should_fail.cold+0x10f/0x159
[  246.258665]  should_failslab+0xdb/0x130
[  246.258680]  kmem_cache_alloc+0x2d7/0x780
[  246.277195]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  246.277211]  ? rcu_read_lock_sched_held+0x110/0x130
[  246.277227]  ? shmem_destroy_callback+0xa0/0xa0
[  246.277239]  shmem_alloc_inode+0x1c/0x50
[  246.277249]  alloc_inode+0x64/0x180
[  246.312277]  new_inode_pseudo+0x19/0xf0
[  246.316260]  new_inode+0x1f/0x40
[  246.319627]  shmem_get_inode+0x75/0x750
[  246.319643]  __shmem_file_setup.part.0+0x111/0x400
[  246.319654]  ? __alloc_fd+0x1d4/0x4a0
[  246.319664]  ? shmem_fill_super+0x8c0/0x8c0
[  246.319680]  SyS_memfd_create+0x1f9/0x3a0
[  246.319690]  ? shmem_fcntl+0x130/0x130
[  246.344683]  ? do_syscall_64+0x53/0x640
[  246.348667]  ? shmem_fcntl+0x130/0x130
[  246.352564]  do_syscall_64+0x1e8/0x640
[  246.356454]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  246.361312]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  246.366502] RIP: 0033:0x459829
[  246.369686] RSP: 002b:00007f86267ef9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  246.377398] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  246.384659] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  246.384666] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845
03:26:18 executing program 2:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r1)
dup2(r1, r0)
openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0)

03:26:18 executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48)
r0 = socket$inet6(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b)
syz_emit_ethernet(0xb7, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6307048e4887d5b2"], 0x0)

03:26:18 executing program 0 (fault-call:5 fault-nth:3):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  246.384672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  246.384678] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004
[  246.433746] loop_reread_partitions: partition scan of loop5 () failed (rc=-16)
[  246.461290] print_req_error: I/O error, dev loop5, sector 1
[  246.467159] print_req_error: I/O error, dev loop5, sector 1
[  246.473079] Buffer I/O error on dev loop5p1, logical block 0, async page read
[  246.486196] print_req_error: I/O error, dev loop5, sector 5
[  246.492124] Buffer I/O error on dev loop5p1, logical block 1, async page read
[  246.499682] print_req_error: I/O error, dev loop5, sector 1
[  246.506097] Buffer I/O error on dev loop5p1, logical block 0, async page read
[  246.513495] print_req_error: I/O error, dev loop5, sector 5
[  246.519216] Buffer I/O error on dev loop5p1, logical block 1, async page read
[  246.530353] print_req_error: I/O error, dev loop5, sector 1
[  246.536098] Buffer I/O error on dev loop5p1, logical block 0, async page read
[  246.536203] print_req_error: I/O error, dev loop5, sector 5
[  246.549141] Buffer I/O error on dev loop5p1, logical block 1, async page read
03:26:18 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")

03:26:18 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000000000005010040000000003eb4803268e212d54de21b0000000000000000eb00"/48])

[  246.560211] print_req_error: I/O error, dev loop5, sector 1
[  246.566144] Buffer I/O error on dev loop5p1, logical block 0, async page read
[  246.573535] print_req_error: I/O error, dev loop5, sector 5
[  246.579285] Buffer I/O error on dev loop5p1, logical block 1, async page read
[  246.586071] FAULT_INJECTION: forcing a failure.
[  246.586071] name failslab, interval 1, probability 0, space 0, times 0
[  246.586878] print_req_error: I/O error, dev loop5, sector 1
[  246.604369] Buffer I/O error on dev loop5p1, logical block 0, async page read
03:26:18 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:18 executing program 4:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0)
ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c)
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
write$uinput_user_dev(r0, &(0x7f0000001d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xea7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c)

[  246.611981] Buffer I/O error on dev loop5p1, logical block 1, async page read
[  246.660903] CPU: 0 PID: 13349 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  246.668057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  246.677398] Call Trace:
[  246.677420]  dump_stack+0x138/0x19c
[  246.677439]  should_fail.cold+0x10f/0x159
[  246.677457]  should_failslab+0xdb/0x130
[  246.677475]  kmem_cache_alloc+0x2d7/0x780
[  246.677490]  ? shmem_alloc_inode+0x1c/0x50
[  246.683783]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  246.683802]  selinux_inode_alloc_security+0xb6/0x2a0
[  246.691895]  security_inode_alloc+0x94/0xd0
[  246.691911]  inode_init_always+0x552/0xaf0
[  246.691923]  alloc_inode+0x81/0x180
[  246.691933]  new_inode_pseudo+0x19/0xf0
[  246.691943]  new_inode+0x1f/0x40
[  246.691956]  shmem_get_inode+0x75/0x750
[  246.691968]  __shmem_file_setup.part.0+0x111/0x400
[  246.691977]  ? __alloc_fd+0x1d4/0x4a0
[  246.691985]  ? shmem_fill_super+0x8c0/0x8c0
[  246.692001]  SyS_memfd_create+0x1f9/0x3a0
[  246.692012]  ? shmem_fcntl+0x130/0x130
[  246.705846]  ? do_syscall_64+0x53/0x640
[  246.705860]  ? shmem_fcntl+0x130/0x130
[  246.705873]  do_syscall_64+0x1e8/0x640
[  246.705882]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  246.705900]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  246.705907] RIP: 0033:0x459829
[  246.705916] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000246
[  246.755556]  ORIG_RAX: 000000000000013f
[  246.755564] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  246.755571] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
03:26:18 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000006f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000005ec0)=[{0x0}, {&(0x7f0000003ac0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0)
bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
mbind(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0xc003, &(0x7f0000000000)=0x4, 0x80, 0x1)
recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400})

[  246.755577] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000
[  246.755583] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267cf6d4
[  246.755589] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006
03:26:18 executing program 0 (fault-call:5 fault-nth:4):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  246.861055] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  246.861064] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  246.878289] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  246.904115] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  246.917319]  loop1: p1[EZD]
[  246.924347] FAULT_INJECTION: forcing a failure.
[  246.924347] name failslab, interval 1, probability 0, space 0, times 0
[  246.939971] CPU: 0 PID: 13375 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  246.944128]  loop5: p1[EZD]
[  246.947099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  246.947105] Call Trace:
[  246.947124]  dump_stack+0x138/0x19c
[  246.947143]  should_fail.cold+0x10f/0x159
[  246.947160]  should_failslab+0xdb/0x130
[  246.947172]  kmem_cache_alloc+0x2d7/0x780
[  246.947189]  ? lock_downgrade+0x6e0/0x6e0
[  246.965672]  get_empty_filp+0x8c/0x3f0
[  246.965686]  alloc_file+0x23/0x440
[  246.965702]  __shmem_file_setup.part.0+0x1b1/0x400
[  246.965713]  ? __alloc_fd+0x1d4/0x4a0
[  246.965724]  ? shmem_fill_super+0x8c0/0x8c0
[  246.965741]  SyS_memfd_create+0x1f9/0x3a0
[  246.977980]  ? shmem_fcntl+0x130/0x130
[  246.977992]  ? do_syscall_64+0x53/0x640
[  246.978002]  ? shmem_fcntl+0x130/0x130
[  246.978015]  do_syscall_64+0x1e8/0x640
[  246.978024]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  246.978039]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  246.978049] RIP: 0033:0x459829
[  246.989571] RSP: 002b:00007f86267ef9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  246.989583] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  246.989590] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  246.989596] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845
03:26:19 executing program 3:
r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4)
sendfile(r0, r0, 0x0, 0xfec)
getpgid(0xffffffffffffffff)
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', <r1=>0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, 0x0)
r3 = socket$inet6(0xa, 0x6, 0x0)
bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1})
ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0)
r4 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r3, 0x6)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0)
setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1)
connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c)
connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)
syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f)
bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0)
setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc)
sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0)

03:26:19 executing program 0 (fault-call:5 fault-nth:5):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  246.989602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267f06d4
[  246.989608] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004
[  247.021395] loop5: p1 size 2047 extends beyond EOD, 
[  247.027996] truncated
03:26:19 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  247.201974] FAULT_INJECTION: forcing a failure.
[  247.201974] name failslab, interval 1, probability 0, space 0, times 0
[  247.217722] CPU: 0 PID: 13388 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  247.224948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  247.234308] Call Trace:
[  247.236901]  dump_stack+0x138/0x19c
[  247.240532]  should_fail.cold+0x10f/0x159
[  247.244687]  should_failslab+0xdb/0x130
[  247.248669]  kmem_cache_alloc+0x2d7/0x780
[  247.252814]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  247.258258]  ? check_preemption_disabled+0x3c/0x250
[  247.263267]  selinux_file_alloc_security+0xb4/0x190
[  247.268360]  security_file_alloc+0x6d/0xa0
[  247.272588]  get_empty_filp+0x162/0x3f0
[  247.276549]  alloc_file+0x23/0x440
[  247.280074]  __shmem_file_setup.part.0+0x1b1/0x400
[  247.284997]  ? __alloc_fd+0x1d4/0x4a0
[  247.288778]  ? shmem_fill_super+0x8c0/0x8c0
[  247.293189]  SyS_memfd_create+0x1f9/0x3a0
[  247.297321]  ? shmem_fcntl+0x130/0x130
[  247.301192]  ? do_syscall_64+0x53/0x640
[  247.305147]  ? shmem_fcntl+0x130/0x130
[  247.309018]  do_syscall_64+0x1e8/0x640
[  247.312885]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  247.317712]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  247.322882] RIP: 0033:0x459829
[  247.326051] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  247.333745] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  247.340995] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
03:26:19 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")

[  247.348282] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000
[  247.355540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86267cf6d4
[  247.362791] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006
03:26:19 executing program 2:
clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r0, 0x0, 0x1, 0xffffffff80000000, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20)
ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000300)={@hyper})
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="000000e473016beb970478f4f1555792c962fa000000c0472c968f707d0100e3e11d3aed7647d738b83e7a39bce379c2e052058ddf266dc9355f12816817e1e1cdb1e52328131d086b72dba0168800b8eeac174e3c32177a8164ca"], 0x7)
r1 = getpid()
ioctl$RTC_UIE_ON(r0, 0x7003)
rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0))
r2 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0)
ptrace(0x10, r1)
ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000))
ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000340)="ab6d55a756")
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000280)={0x0})
r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfffffffffffffe00, 0x2)
execveat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000140)='/dev/rtc#\x00', &(0x7f0000000180)='vmnet1proc\x00', &(0x7f00000001c0)='*em0\x00', &(0x7f0000000200)='/dev/rtc#\x00'], &(0x7f00000002c0), 0x1000)
r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8)
getsockname$packet(r0, &(0x7f0000000680)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000700)={'nr0\x00', <r7=>0x0})
ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000780)={'vcan0\x00', <r8=>0x0})
getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001d40)={<r9=>0x0, @local}, &(0x7f0000001d80)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000001dc0)={'vcan0\x00', <r10=>0x0})
getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000001e00)={@initdev, <r11=>0x0}, &(0x7f0000001e40)=0x14)
getsockname$packet(r0, &(0x7f0000001f40)={0x11, 0x0, <r12=>0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f80)=0x14)
accept$packet(r3, &(0x7f0000002400)={0x11, 0x0, <r13=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002440)=0x14)
getsockopt$inet6_mreq(r0, 0x29, 0x10, &(0x7f0000002480)={@mcast2, <r14=>0x0}, &(0x7f0000000740)=0xffffffffffffff3e)
getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000069c0)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000006ac0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000007100)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000070c0)={&(0x7f0000006b00)={0x598, r4, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0xbc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r6}, {0x4}}, {{0x8, 0x1, r7}, {0x12c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x952}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xc4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r9}, {0x200, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x6, 0x2, 0xfffffffffffffffd, 0x3}, {0x4, 0x6, 0x9, 0x9}, {0x20, 0x9, 0xa17, 0x5}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r11}, {0x128, 0x2, [{0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}]}}]}, 0x598}, 0x1, 0x0, 0x0, 0x1}, 0xc000)

[  247.447743] input: syz0 as /devices/virtual/input/input8
03:26:19 executing program 4:
r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0)
ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x11fffffffe)
syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x541)
r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7, 0x40001)
ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000040)={0xb, {0x0, 0x8, 0x8000, 0x6}})
ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000001c0)={0x4, "1d9c9a5a1c24d36532900080e7a5ecb61779831d911ae4b9553efef8a64aa1cd", 0x811, 0x7, 0x7f, 0x6, 0x2})

[  247.509032] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  247.536407] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:19 executing program 2:
timer_create(0x2, 0x0, &(0x7f00000015c0))
timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x77359400}}, 0x0)
timer_gettime(0x0, &(0x7f0000000040))
r0 = syz_open_dev$dspn(&(0x7f0000001000)='/dev/dsp#\x00', 0x5, 0x208a01)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001040)={<r1=>0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x7ff, 0x1ff}, &(0x7f0000001100)=0x90)
setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000001140)=r1, 0x4)

03:26:19 executing program 0 (fault-call:5 fault-nth:6):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  247.560513]  loop1: p1[EZD]
03:26:19 executing program 4:
r0 = socket$inet_sctp(0x2, 0x1, 0x84)
connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @initdev}, 0x10)
listen(r0, 0x100000000009)
r1 = accept(r0, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x6c, &(0x7f0000000180), &(0x7f0000000000)=0x8)

03:26:19 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='map_files\x00')
getdents(r0, &(0x7f0000000300)=""/4096, 0x18)
r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x20000, 0x0)
ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000040)={0xfffffffffffffff8, 0x100000001, 0x2, 0xfffffffffffffffa, 0x1, 0x800})
openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x100, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000080)='map_files\x00', 0xffffffffffffffff}, 0x30)
syz_open_procfs(r2, &(0x7f0000000100)='net/route\x00')

[  247.613551] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  247.636410] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  247.653504]  loop5: p1[EZD]
03:26:19 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  247.659310] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:19 executing program 2:
syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="96116d4d071b9903e62dd364ff0cbc30b2b87e35f7588574b19fed3fcc2956dd8abfa76498743cccc17727eb4df103a0c3bbdef34520b16485e6b1911930da17a5066229422ba571ee964441ef3c3b22be4423bcd10e06943ee13cd78cb6de7bbfda2d3aeced7717ed05bf7771f777719a4e493b03dbf9012f44545b6d65d9591e7162cca14634b5cb1da12a8cd7874e7d968c9c1d5b6f01527f79244bed41180e", 0xa1, 0xa1b}, {&(0x7f0000000240)="ba7a78f588a0f2791ae81d577916aa2c60ec14d4408762f2b74dc3743809a947be63c81672b851ae4f8d373b29b17fcd7b43004651b775c316ed1a19e6c18e73ee33674b75621e8d5f40bec83921e1defa5a74b0767635840660f013d33a10656613c2da921c286cf7d25e382243df6def49c1dc149491567346a596cb4128af381e1823fba883c7233d8efd86c421ac3f66d5f3f67fe0d5313b125b7124e85befadb37f041f31fb2118f9992bcb33ebb89c6004006c03d976", 0xb9, 0x80000001}, {&(0x7f0000000300)="4340786e329d9ddc7311df038f19de18ed96f6b0ac65b8a88316a690d80b9f7deef5026210ec183745cb394e00c8e237bd39a31235c395f9295a883a14ca84f6ea4c0039986d412f99fdaafc56", 0x4d, 0x7f7}], 0x11001, &(0x7f00000001c0)='vboxnet1}md5sum\xda\\-\':mime_type\xfc/\x00')
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x400, &(0x7f0000000180)="11dca50d5e0bcfe47bf070")
ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000000)={0x1, 0x0, 0x79c4})
close(r0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x20000, 0x40)
ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000540))
setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000480)=0xb16, 0x4)

[  247.699209] FAULT_INJECTION: forcing a failure.
[  247.699209] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  247.718407] CPU: 0 PID: 13427 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  247.725571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  247.725585] Call Trace:
[  247.725601]  dump_stack+0x138/0x19c
[  247.725620]  should_fail.cold+0x10f/0x159
[  247.725631]  ? __might_sleep+0x93/0xb0
[  247.725647]  __alloc_pages_nodemask+0x1d6/0x7a0
[  247.737588]  ? __alloc_pages_slowpath+0x2930/0x2930
[  247.745319]  ? lock_downgrade+0x6e0/0x6e0
[  247.745337]  alloc_pages_vma+0xc9/0x4c0
[  247.745353]  shmem_alloc_page+0xf6/0x1a0
[  247.753864]  ? shmem_swapin+0x1a0/0x1a0
[  247.753877]  ? cred_has_capability+0x142/0x290
[  247.753888]  ? check_preemption_disabled+0x3c/0x250
[  247.753901]  ? __this_cpu_preempt_check+0x1d/0x30
[  247.763046]  ? percpu_counter_add_batch+0x112/0x160
[  247.794452]  ? __vm_enough_memory+0x26a/0x490
[  247.798959]  shmem_alloc_and_acct_page+0x12a/0x680
[  247.803894]  shmem_getpage_gfp+0x3e7/0x25d0
[  247.808212]  ? shmem_add_to_page_cache+0x860/0x860
[  247.813134]  ? iov_iter_fault_in_readable+0x1da/0x3c0
[  247.818320]  shmem_write_begin+0xfd/0x1b0
[  247.822457]  ? trace_hardirqs_on_caller+0x400/0x590
[  247.827460]  generic_perform_write+0x1f8/0x480
[  247.832033]  ? page_endio+0x530/0x530
[  247.835814]  ? current_time+0xb0/0xb0
[  247.839599]  ? generic_file_write_iter+0x9a/0x660
[  247.844426]  __generic_file_write_iter+0x239/0x5b0
[  247.849344]  generic_file_write_iter+0x303/0x660
[  247.854090]  __vfs_write+0x4a7/0x6b0
[  247.857785]  ? selinux_file_open+0x420/0x420
[  247.862175]  ? kernel_read+0x120/0x120
[  247.866045]  ? check_preemption_disabled+0x3c/0x250
[  247.871047]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  247.876482]  ? rcu_sync_lockdep_assert+0x6d/0xb0
[  247.881217]  ? __sb_start_write+0x153/0x2f0
[  247.885523]  vfs_write+0x198/0x500
[  247.889048]  SyS_pwrite64+0x115/0x140
[  247.892831]  ? SyS_pread64+0x140/0x140
[  247.896701]  ? do_syscall_64+0x53/0x640
[  247.900658]  ? SyS_pread64+0x140/0x140
[  247.904528]  do_syscall_64+0x1e8/0x640
[  247.908396]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  247.913224]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  247.918396] RIP: 0033:0x413777
[  247.921567] RSP: 002b:00007f86267ce9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[  247.929607] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777
[  247.936862] RDX: 0000000000000040 RSI: 0000000020000080 RDI: 0000000000000007
03:26:20 executing program 3:
r0 = memfd_create(&(0x7f0000000040)='$trusted%vboxnet1,]system\x00', 0x4)
sendfile(r0, r0, 0x0, 0xfec)
getpgid(0xffffffffffffffff)
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', <r1=>0x0})
bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x20000000000, r1, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]}}], 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, 0x0)
r3 = socket$inet6(0xa, 0x6, 0x0)
bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, 0x3b, r1})
ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0)
r4 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r3, 0x6)
ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, 0x0)
setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1)
connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e20, 0x2, @dev, 0x3}, 0x1c)
connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)
syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f)
bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, 0x0)
setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc)
sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0)

03:26:20 executing program 2:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0)
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x20600)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, 0x0, 0x0)
clock_nanosleep(0x5, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000100))
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
socket$inet_icmp_raw(0x2, 0x3, 0x1)
unshare(0x4020000)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000280)={0x1, 0x7, 0x2000}, 0x4)
r3 = creat(&(0x7f0000000300)='./bus\x00', 0x1)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0)
setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000002c0), 0x4)
ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000140))
open$dir(0x0, 0x0, 0x0)
ustat(0x5, &(0x7f0000000000))
mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0)
ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000240))

[  247.944134] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 0000000000000000
[  247.951423] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000007
[  247.958675] R13: 0000000000000007 R14: 00007f86267cf6d4 R15: 0000000000000006
03:26:20 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0")

[  248.061567] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  248.086649] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  248.093398]  loop1: p1[EZD]
03:26:20 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:20 executing program 0 (fault-call:5 fault-nth:7):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  248.200842] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  248.216815] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  248.223024]  loop5: p1[EZD]
[  248.226785] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:20 executing program 5 (fault-call:3 fault-nth:0):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  248.353144] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  248.396589] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  248.409237]  loop1: p1[EZD]
[  248.413358] FAULT_INJECTION: forcing a failure.
[  248.413358] name failslab, interval 1, probability 0, space 0, times 0
[  248.421773] FAULT_INJECTION: forcing a failure.
[  248.421773] name failslab, interval 1, probability 0, space 0, times 0
[  248.436046] CPU: 1 PID: 13475 Comm: syz-executor.5 Not tainted 4.14.135 #31
03:26:20 executing program 4:
r0 = socket(0x20000000000000a, 0x3, 0x4)
ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'ip6gre0\x00', 0x3})
getsockopt$sock_buf(r0, 0x1, 0x30, 0x0, &(0x7f0000000040))
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00')
sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x50010204}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x12, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40804}, 0x200000c0)
accept$ax25(r0, &(0x7f0000000080)={{0x3, @netrom}, [@null, @rose, @bcast, @netrom, @null, @bcast, @null, @bcast]}, &(0x7f0000000100)=0xffffffffffffffbc)

[  248.443157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  248.452515] Call Trace:
[  248.455113]  dump_stack+0x138/0x19c
[  248.458749]  should_fail.cold+0x10f/0x159
[  248.462906]  should_failslab+0xdb/0x130
[  248.466885]  __kmalloc+0x2f0/0x7a0
[  248.470432]  ? __sb_end_write+0xc1/0x100
[  248.474489]  ? strnlen_user+0x12f/0x1a0
[  248.478451]  ? SyS_memfd_create+0xba/0x3a0
[  248.482688]  SyS_memfd_create+0xba/0x3a0
[  248.486750]  ? shmem_fcntl+0x130/0x130
[  248.490638]  ? do_syscall_64+0x53/0x640
[  248.494609]  ? shmem_fcntl+0x130/0x130
[  248.498497]  do_syscall_64+0x1e8/0x640
[  248.502383]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  248.507229]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  248.512414] RIP: 0033:0x459829
[  248.515610] RSP: 002b:00007f498c7369f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  248.523317] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  248.530587] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  248.537855] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000
03:26:20 executing program 4:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4)
bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
sendto$inet(r0, 0x0, 0x223, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4)
getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={<r1=>0x0, 0x8}, &(0x7f0000000080)=0x8)
setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r1, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendto$inet(r0, &(0x7f0000000740)="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", 0x7d8, 0x0, 0x0, 0x0)

03:26:20 executing program 2:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0)
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x20600)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, 0x0, 0x0)
clock_nanosleep(0x5, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000100))
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
socket$inet_icmp_raw(0x2, 0x3, 0x1)
unshare(0x4020000)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000280)={0x1, 0x7, 0x2000}, 0x4)
r3 = creat(&(0x7f0000000300)='./bus\x00', 0x1)
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0)
setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000002c0), 0x4)
ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000140))
open$dir(0x0, 0x0, 0x0)
ustat(0x5, &(0x7f0000000000))
mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381)
openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0)
ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000240))

[  248.545125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7376d4
[  248.552387] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006
[  248.563195] CPU: 0 PID: 13474 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  248.570316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  248.570321] Call Trace:
[  248.570336]  dump_stack+0x138/0x19c
[  248.570353]  should_fail.cold+0x10f/0x159
[  248.570367]  should_failslab+0xdb/0x130
[  248.570379]  kmem_cache_alloc+0x2d7/0x780
[  248.570388]  ? vfs_write+0x25f/0x500
[  248.570402]  getname_flags+0xcb/0x580
[  248.570412]  ? check_preemption_disabled+0x3c/0x250
[  248.570423]  getname+0x1a/0x20
[  248.570432]  do_sys_open+0x1e7/0x430
[  248.570443]  ? filp_open+0x70/0x70
[  248.570451]  ? fput+0xd4/0x150
[  248.570461]  ? SyS_pwrite64+0xca/0x140
[  248.570474]  SyS_open+0x2d/0x40
[  248.570481]  ? do_sys_open+0x430/0x430
[  248.570493]  do_syscall_64+0x1e8/0x640
[  248.570501]  ? trace_hardirqs_off_thunk+0x1a/0x1c
03:26:20 executing program 0 (fault-call:5 fault-nth:8):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  248.570515]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  248.570522] RIP: 0033:0x413711
[  248.570527] RSP: 002b:00007f86267ce9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
[  248.570537] RAX: ffffffffffffffda RBX: 00007f86267cf6d4 RCX: 0000000000413711
[  248.570542] RDX: 00007f86267cebaa RSI: 0000000000000002 RDI: 00007f86267ceba0
[  248.570547] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a
[  248.570552] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007
[  248.570557] R13: 0000000000000007 R14: 00007f86267cf6d4 R15: 0000000000000006
03:26:20 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

03:26:20 executing program 5 (fault-call:3 fault-nth:1):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  248.806971] FAULT_INJECTION: forcing a failure.
[  248.806971] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  248.818808] CPU: 0 PID: 13494 Comm: syz-executor.0 Not tainted 4.14.135 #31
[  248.825901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  248.835242] Call Trace:
[  248.837816]  dump_stack+0x138/0x19c
[  248.841430]  should_fail.cold+0x10f/0x159
[  248.845563]  __alloc_pages_nodemask+0x1d6/0x7a0
[  248.850234]  ? fs_reclaim_acquire+0x20/0x20
[  248.854540]  ? __alloc_pages_slowpath+0x2930/0x2930
[  248.859543]  cache_grow_begin+0x80/0x400
[  248.863585]  kmem_cache_alloc+0x6a6/0x780
[  248.867714]  ? vfs_write+0x25f/0x500
[  248.871411]  getname_flags+0xcb/0x580
[  248.875191]  ? check_preemption_disabled+0x3c/0x250
[  248.880189]  getname+0x1a/0x20
[  248.883359]  do_sys_open+0x1e7/0x430
[  248.887059]  ? filp_open+0x70/0x70
[  248.890580]  ? fput+0xd4/0x150
[  248.893755]  ? SyS_pwrite64+0xca/0x140
[  248.897626]  SyS_open+0x2d/0x40
[  248.900888]  ? do_sys_open+0x430/0x430
[  248.904758]  do_syscall_64+0x1e8/0x640
[  248.908624]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  248.913449]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  248.918615] RIP: 0033:0x413711
[  248.921786] RSP: 002b:00007f86267ce9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
[  248.929478] RAX: ffffffffffffffda RBX: 00007f86267cf6d4 RCX: 0000000000413711
[  248.936729] RDX: 00007f86267cebaa RSI: 0000000000000002 RDI: 00007f86267ceba0
[  248.943980] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a
[  248.951230] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007
[  248.958482] R13: 0000000000000007 R14: 00007f86267cf6d4 R15: 0000000000000006
[  248.971517] FAULT_INJECTION: forcing a failure.
[  248.971517] name failslab, interval 1, probability 0, space 0, times 0
[  248.983517] CPU: 1 PID: 13499 Comm: syz-executor.5 Not tainted 4.14.135 #31
[  248.990627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  248.999979] Call Trace:
[  249.002568]  dump_stack+0x138/0x19c
[  249.006196]  should_fail.cold+0x10f/0x159
[  249.010338]  should_failslab+0xdb/0x130
[  249.010352]  kmem_cache_alloc+0x2d7/0x780
[  249.010364]  ? __alloc_fd+0x1d4/0x4a0
[  249.010383]  __d_alloc+0x2d/0x9f0
[  249.025720]  ? lock_downgrade+0x6e0/0x6e0
[  249.029876]  d_alloc_pseudo+0x1e/0x30
[  249.033680]  __shmem_file_setup.part.0+0xd8/0x400
[  249.038521]  ? __alloc_fd+0x1d4/0x4a0
[  249.038537]  ? shmem_fill_super+0x8c0/0x8c0
[  249.038553]  SyS_memfd_create+0x1f9/0x3a0
[  249.046639]  ? shmem_fcntl+0x130/0x130
03:26:21 executing program 3:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="380100001a002100000000000000000000000000000000000000000000000001ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000001000000006c000000ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff01000000000000000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000480003006c7a6a6800000000000000000000000000000000000000000000000000000000c7b7d10000000000000000000000000000000000000000000000000000000000007f9c00000000"], 0x138}}, 0x0)
flock(r0, 0x4)

03:26:21 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc}]}}}]}, 0x3c}}, 0x0)
r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffb, 0x107000)
r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x600, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x14, 0x13, @l2={'eth', 0x3a, 'netdevsim0\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x44005}, 0x80)
ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000240))

03:26:21 executing program 4:
r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0)
ioctl$int_out(r0, 0x2, &(0x7f0000000000))

03:26:21 executing program 4:
r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8000)
ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000080000000000000003054fb272e05fdd051b6ae770b84"], 0x10)
r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe)
r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r1)
r3 = syz_open_dev$radio(0x0, 0x3, 0x2)
write$P9_RSTATFS(r0, &(0x7f0000000300)={0x43, 0x9, 0x1, {0xfffffffffffffffc, 0x3ff, 0x3ff, 0x4, 0x84, 0x3, 0xfffffffffffffffa, 0xab, 0x7}}, 0x43)
ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x8a6f, <r4=>0x0, 0x10000, 0xcc6e})
getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000400)={<r5=>0x0, 0xf1b}, &(0x7f0000000440)=0x8)
setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000480)={r5, 0x3f}, 0x8)
ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000140)={0xd5, r4})
io_setup(0x4, &(0x7f0000000180)=<r6=>0x0)
io_destroy(r6)
ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, 0x0)
r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a493", 0x41, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r2, r7}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}})

[  249.046650]  ? do_syscall_64+0x53/0x640
[  249.046661]  ? shmem_fcntl+0x130/0x130
[  249.054663]  do_syscall_64+0x1e8/0x640
[  249.054673]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  249.054689]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  249.063050] RIP: 0033:0x459829
[  249.063055] RSP: 002b:00007f498c7369f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  249.063066] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  249.063072] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
03:26:21 executing program 5 (fault-call:3 fault-nth:2):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:21 executing program 3:
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0)
r1 = dup(r0)
ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x7fff, 0x70e})
ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c80, 0xfffffffffffffffe)
syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x101040)

[  249.063077] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000
[  249.063082] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7376d4
[  249.063087] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006
03:26:21 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

[  249.183086] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  249.218796] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:21 executing program 4:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
fchdir(r0)
open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
statfs(&(0x7f00000008c0)='./bus\x00', &(0x7f0000000900)=""/80)
prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000))

03:26:21 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x2, 0x7, 0x10001, 0x0, 0x5})
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00')
sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)={0x2c, r2, 0x211, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}}, 0x2c}}, 0x0)

[  249.239063]  loop0: p1[EZD]
[  249.257317] loop0: p1 size 2047 extends beyond EOD, truncated
[  249.302909] FAULT_INJECTION: forcing a failure.
[  249.302909] name failslab, interval 1, probability 0, space 0, times 0
[  249.332720] CPU: 1 PID: 13527 Comm: syz-executor.5 Not tainted 4.14.135 #31
[  249.339870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  249.339875] Call Trace:
[  249.339893]  dump_stack+0x138/0x19c
[  249.339908]  should_fail.cold+0x10f/0x159
[  249.339926]  should_failslab+0xdb/0x130
[  249.363523]  kmem_cache_alloc+0x2d7/0x780
[  249.367779]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  249.373213]  ? rcu_read_lock_sched_held+0x110/0x130
[  249.378209]  ? shmem_destroy_callback+0xa0/0xa0
[  249.382859]  shmem_alloc_inode+0x1c/0x50
[  249.386899]  alloc_inode+0x64/0x180
[  249.390507]  new_inode_pseudo+0x19/0xf0
[  249.394461]  new_inode+0x1f/0x40
[  249.397827]  shmem_get_inode+0x75/0x750
[  249.401782]  __shmem_file_setup.part.0+0x111/0x400
[  249.406692]  ? __alloc_fd+0x1d4/0x4a0
[  249.410472]  ? shmem_fill_super+0x8c0/0x8c0
[  249.414777]  SyS_memfd_create+0x1f9/0x3a0
[  249.418907]  ? shmem_fcntl+0x130/0x130
[  249.422773]  ? do_syscall_64+0x53/0x640
[  249.426726]  ? shmem_fcntl+0x130/0x130
[  249.430598]  do_syscall_64+0x1e8/0x640
[  249.434466]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  249.439386]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  249.444554] RIP: 0033:0x459829
[  249.447721] RSP: 002b:00007f498c7579f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  249.455416] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  249.462664] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  249.469911] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845
[  249.477162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7586d4
[  249.484413] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004
03:26:21 executing program 0:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
r1 = socket$isdn(0x22, 0x3, 0x2)
getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:21 executing program 4:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'eql\x00', 0x3}, 0x18)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081", 0x7}], 0x1}, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009})
r2 = socket$kcm(0x29, 0x6, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="006703000f"], 0xfdef)

03:26:21 executing program 2:
unshare(0x2000400)
r0 = fanotify_init(0x0, 0x0)
r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8)
getgroups(0x1, &(0x7f0000000380)=[<r3=>0xffffffffffffffff])
fchownat(r1, &(0x7f0000000200)='./file0\x00', r2, r3, 0x400)
fanotify_mark(r0, 0x90, 0x0, 0xffffffffffffffff, 0x0)
r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={<r5=>0x0, 0x48, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x101, @local, 0xe94b}, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @broadcast}, 0xef}, @in={0x2, 0x4e22, @rand_addr=0x9}]}, &(0x7f0000000100)=0x10)
getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000140)={r5, 0xcd02}, &(0x7f0000000180)=0x8)

03:26:21 executing program 2:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="de0893e38ff82fb7", 0x8}], 0x1, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246)
syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2)
r1 = syz_open_dev$dspn(&(0x7f00000005c0)='/dev/dsp#\x00', 0xc55, 0x80)
ioctl$EVIOCGREP(r1, 0x4010744d, &(0x7f0000000500)=""/174)
openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10000, 0x0)

03:26:21 executing program 5 (fault-call:3 fault-nth:3):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:21 executing program 2:
r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40200, 0x0)
ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000740)=""/4096)
openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="7685427801bf9010063037780953c84a64", 0x11, 0xfffffffffffffffd)
r2 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe)
r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r3, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}})

03:26:21 executing program 3:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x980000, 0x1, 0x0, [], &(0x7f0000000000)={0x98f90a, 0xd408, [], @p_u8=&(0x7f0000000140)}})
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = syz_open_procfs(0x0, 0x0)
clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff)
rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8)
r2 = getpid()
rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100))
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='\n\x00\x00g\"\xc5)\xb2\xba\xdf\x91\x13/syz0\x00', 0x1ff)
lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540))
ptrace(0x10, r2)
sched_getparam(r2, 0x0)
ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00')
sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8048000}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB="0809006d1a833150f6a31411023722b3b12501b50177defd6cd66cc9", @ANYRES16=r3, @ANYBLOB="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"], 0x19c}, 0x1, 0x0, 0x0, 0x11}, 0x40000)
symlinkat(0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
arch_prctl$ARCH_GET_CPUID(0x1011)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0)

[  249.642309] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  249.694457] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  249.702466] FAULT_INJECTION: forcing a failure.
[  249.702466] name failslab, interval 1, probability 0, space 0, times 0
[  249.731852]  loop1: p1[EZD]
[  249.753507] CPU: 0 PID: 13571 Comm: syz-executor.5 Not tainted 4.14.135 #31
[  249.760654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  249.770011] Call Trace:
[  249.772609]  dump_stack+0x138/0x19c
[  249.776251]  should_fail.cold+0x10f/0x159
[  249.780415]  should_failslab+0xdb/0x130
[  249.784400]  kmem_cache_alloc+0x2d7/0x780
[  249.788562]  ? shmem_alloc_inode+0x1c/0x50
[  249.792803]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  249.798259]  selinux_inode_alloc_security+0xb6/0x2a0
[  249.803370]  security_inode_alloc+0x94/0xd0
[  249.807698]  inode_init_always+0x552/0xaf0
[  249.811937]  alloc_inode+0x81/0x180
[  249.815589]  new_inode_pseudo+0x19/0xf0
[  249.819569]  new_inode+0x1f/0x40
[  249.822941]  shmem_get_inode+0x75/0x750
[  249.826924]  __shmem_file_setup.part.0+0x111/0x400
[  249.831840]  ? __alloc_fd+0x1d4/0x4a0
[  249.835622]  ? shmem_fill_super+0x8c0/0x8c0
[  249.839942]  SyS_memfd_create+0x1f9/0x3a0
[  249.844082]  ? shmem_fcntl+0x130/0x130
[  249.847976]  ? do_syscall_64+0x53/0x640
[  249.851933]  ? shmem_fcntl+0x130/0x130
[  249.855813]  do_syscall_64+0x1e8/0x640
[  249.859691]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  249.864538]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  249.869723] RIP: 0033:0x459829
[  249.872906] RSP: 002b:00007f498c7369f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  249.880615] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  249.887882] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  249.895152] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000
03:26:21 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
write(0xffffffffffffffff, 0x0, 0x0)
openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0xfffffffffffffffe, &(0x7f0000000240))
getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14)
setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000001c0)={@local, @multicast2, r2}, 0xfffffffffffffef0)
getsockname$packet(r1, 0x0, 0x0)
r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000000)={0x7, 0x26, 0x0, <r4=>0xffffffffffffffff})
r5 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xdef, 0x0)
socketpair(0x45940bba6ad991dc, 0x800, 0xfffffffffffff790, &(0x7f0000000200))
ioctl$BLKDISCARD(r5, 0x1277, &(0x7f00000000c0)=0x564)
ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000040)=0x6)
ioctl$PPPIOCSCOMPRESS(r5, 0x4010744d)

03:26:22 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x50}}, 0x0)
r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x90040, 0x0)
ioctl$SIOCRSACCEPT(r1, 0x89e3)

[  249.902413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7376d4
[  249.909661] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000006
[  249.931049] loop_reread_partitions: partition scan of loop1 () failed (rc=-16)
[  249.940885] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:26:22 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

03:26:22 executing program 4:
r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='.dead\x00', &(0x7f0000000140)='/dev/fuse\x00')
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
pipe(&(0x7f0000000180)={<r2=>0xffffffffffffffff})
ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f00000001c0)=0x20)
setrlimit(0xe, &(0x7f0000000100)={0x0, 0x6})
io_setup(0x90e4, &(0x7f0000003800)=<r3=>0x0)
io_submit(r3, 0x1, &(0x7f0000003ac0)=[&(0x7f0000003a80)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}])

03:26:22 executing program 5 (fault-call:3 fault-nth:4):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  249.980646] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  249.986641]  loop0: p1[EZD]
[  250.016271] loop0: p1 size 2047 extends beyond EOD, truncated
[  250.086220] FAULT_INJECTION: forcing a failure.
[  250.086220] name failslab, interval 1, probability 0, space 0, times 0
[  250.104827] CPU: 1 PID: 13596 Comm: syz-executor.5 Not tainted 4.14.135 #31
[  250.111979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  250.121337] Call Trace:
[  250.123937]  dump_stack+0x138/0x19c
[  250.127572]  should_fail.cold+0x10f/0x159
[  250.131772]  should_failslab+0xdb/0x130
[  250.135754]  kmem_cache_alloc+0x2d7/0x780
[  250.139896]  ? lock_downgrade+0x6e0/0x6e0
[  250.144032]  get_empty_filp+0x8c/0x3f0
[  250.147904]  alloc_file+0x23/0x440
[  250.151428]  __shmem_file_setup.part.0+0x1b1/0x400
[  250.156341]  ? __alloc_fd+0x1d4/0x4a0
[  250.160124]  ? shmem_fill_super+0x8c0/0x8c0
[  250.164432]  SyS_memfd_create+0x1f9/0x3a0
[  250.168560]  ? shmem_fcntl+0x130/0x130
[  250.172445]  ? do_syscall_64+0x53/0x640
[  250.176398]  ? shmem_fcntl+0x130/0x130
[  250.180282]  do_syscall_64+0x1e8/0x640
[  250.184151]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  250.188994]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  250.194164] RIP: 0033:0x459829
[  250.197352] RSP: 002b:00007f498c7579f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  250.205057] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  250.212310] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  250.219649] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845
[  250.226904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7586d4
[  250.235655] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004
[  250.268807] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:26:22 executing program 0:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
r1 = dup3(r0, r0, 0x80000)
setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x62, @local, 0x4e22, 0x1, 'sh\x00', 0x20, 0xa3, 0xd}, 0x2c)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:22 executing program 3:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, 0x0)

03:26:22 executing program 2:
sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r1 = dup3(r0, r0, 0x80000)
r2 = creat(&(0x7f0000000100)='./file0\x00', 0x140)
setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x4000, 0x0)
futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0)
futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0)
write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7)
futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0)
exit(0x0)

03:26:22 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
getsockname$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/110, 0x6e)
ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x630}, {&(0x7f00000000c0)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x3f}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xf0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0xa4, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400})

[  250.289327] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  250.296630]  loop1: p1[EZD]
03:26:22 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

03:26:22 executing program 5 (fault-call:3 fault-nth:5):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:22 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00')
readv(r0, &(0x7f0000000000)=[{&(0x7f0000242000)=""/2560, 0xc0f}], 0x1)
readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/112, 0x70}], 0x1)

[  250.561965] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  250.571759] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  250.585833] FAULT_INJECTION: forcing a failure.
[  250.585833] name failslab, interval 1, probability 0, space 0, times 0
03:26:22 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0)
r2 = userfaultfd(0x0)
ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080))
ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r3 = socket$inet6_sctp(0xa, 0x5, 0x84)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000000040)=0x8)
r4 = dup2(r3, r3)
setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000100)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78)
r5 = dup2(r1, r3)
dup3(r5, r2, 0x0)

[  250.608568] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  250.614728] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  250.630318] CPU: 0 PID: 13635 Comm: syz-executor.5 Not tainted 4.14.135 #31
[  250.637452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  250.646813] Call Trace:
[  250.649409]  dump_stack+0x138/0x19c
[  250.653053]  should_fail.cold+0x10f/0x159
[  250.657213]  should_failslab+0xdb/0x130
[  250.661186]  kmem_cache_alloc+0x2d7/0x780
[  250.661199]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  250.661213]  ? check_preemption_disabled+0x3c/0x250
[  250.661230]  selinux_file_alloc_security+0xb4/0x190
[  250.661243]  security_file_alloc+0x6d/0xa0
[  250.670812]  get_empty_filp+0x162/0x3f0
[  250.670824]  alloc_file+0x23/0x440
[  250.670836]  __shmem_file_setup.part.0+0x1b1/0x400
[  250.670844]  ? __alloc_fd+0x1d4/0x4a0
[  250.670854]  ? shmem_fill_super+0x8c0/0x8c0
[  250.680416] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  250.680862]  SyS_memfd_create+0x1f9/0x3a0
[  250.685287] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  250.689040]  ? shmem_fcntl+0x130/0x130
[  250.689052]  ? do_syscall_64+0x53/0x640
[  250.689063]  ? shmem_fcntl+0x130/0x130
[  250.689075]  do_syscall_64+0x1e8/0x640
[  250.689084]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  250.689100]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  250.689110] RIP: 0033:0x459829
[  250.696472]  loop3: p1[EZD]
[  250.697537] RSP: 002b:00007f498c7579f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[  250.697550] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829
[  250.697556] RDX: 0000000020018210 RSI: 0000000000000000 RDI: 00000000004be492
[  250.697563] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000046505845
[  250.697569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f498c7586d4
[  250.697575] R13: 00000000004be492 R14: 00000000004dfd80 R15: 0000000000000004
[  250.710310]  loop0: p1[EZD]
[  250.722001]  loop1: p1[EZD]
03:26:22 executing program 4:
setreuid(0x0, 0xee00)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x800000000000, 0x0, 0x8000000000000})
r1 = syz_open_pts(r0, 0x0)
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040))
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7)

03:26:22 executing program 5 (fault-call:3 fault-nth:6):
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  250.816330] loop0: p1 size 2047 extends beyond EOD, truncated
03:26:22 executing program 3:
r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040))
read$alg(r0, &(0x7f0000000080)=""/122, 0x7a)
ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'vcan0\x00', {0x2, 0x4e22, @empty}})
ioctl$VT_WAITACTIVE(r0, 0x5607)
setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0x7, 0xffffffffffff8000})
syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00')
r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00')
sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r1, 0x100, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x10001}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x200400c0)
fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f00000003c0)={0x3, @bcast, r2})
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
setsockopt$inet_dccp_int(r0, 0x21, 0x17, &(0x7f0000000400)=0x4, 0x4)
ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000480)=@get={0x1, &(0x7f0000000440)=""/41, 0x5})
ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000004c0)={0x5, 0x1, @stop_pts=0xfffffffffffffffb})
ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540))
ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x6452)
ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000580)={&(0x7f0000ffc000/0x1000)=nil, 0x3f, 0x1, 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x5})
ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000005c0))
ioctl(r0, 0x0, &(0x7f0000000600)="ea69ae7af9f727debe34afa1bf4155")
setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000640)=@gcm_256={{}, "e1b4a1a363367085", "4a9236e405091a8d9e591f89d99d867a72645010c84a4c515ce595810fb695e8", "d9dd8c33", "53ea33673bcd171d"}, 0x38)
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000680)={'bridge_slave_1\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}})
set_thread_area(&(0x7f00000006c0)={0x9, 0x20001000, 0x1000, 0x7, 0xfe, 0xfffffffffffffff7, 0x7, 0x3547, 0x3f, 0x3})
setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000700)={0x9, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e23, @broadcast}}}, 0x108)
ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000840)="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")
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000940)=0x2000)
syz_open_dev$dri(&(0x7f0000000980)='/dev/dri/card#\x00', 0x6, 0x0)
fsync(r0)
ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000009c0)={0x0, 0x6})

03:26:22 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

03:26:23 executing program 0:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7375626a5f757365723d9b03ee1d215d2c00"])
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:23 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40001, 0x4)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1)
r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000006fc0)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000070c0)=0xe8)
sendmmsg$inet(r1, &(0x7f0000007200)=[{{&(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000000c0)="36575217ec4e9f142458c2a2f2dcafa11aa0aee4b83eca0cab64ab969c367fa9c8ea1590f94ac8c5fc9a932bb1a5a007de9c324ffc28ca9f591645239befa5eb9adbe5256fa43df3ab072c43e0fe16946eff53d7105acdd22f6384f3b55bf56d07b7a08e832063e43354b13c5ed2168217e22fa1d91c9eb20ab6fc7ab16e77642bd39b43ab10de37c85c7360af9ace0283135e4f7ad4717d3d8f23a3a553837c1d7d636bf2c14abd9087ca89375d043cd7dafa3f978fa3c0f89edda0d69af551ea31a72860d97f10f9a2edf426c6353da83125840501f2e8a839c59055ec5f6c7696941c", 0xe4}, {&(0x7f00000001c0)="4108fba34a9c6e913399ca91b08309ea2fdd57d1f56e28d09868fd345f2c6b2401f7a9d5770610eb8452f27a5d5f48c0bf3f83b5f289a0dc27ab8d8f71a04c79bd07f055c2af3110c6351f88db219100c6217f841b1c7ca32657c8aa00e0e76f9ccaf8f16e411f4d2a62d55dd56cb6993c090a54f0771e861d50355a0468f748a101e6d731131cc18c76779117f3fe8140bda521903d6a5cb68d38d9599b27bf068023cdf234ef6703cbfbbf18c6b7f8e166f4da2c384f250f1e", 0xba}, {&(0x7f0000000280)="bde2bdcf2c3aa221541b3209a18b6124f892c464c71bced7b14eac4317fd12a27f4e1cef7c3f8e9001a1dbdb951698301fe90fe1855029c5813a879f766cc1b0968da928b90babd5fa751b87dc2945deac23c10e6896a77c7355ec67685ec2ebefdcc7de23f1ccce73c080932026b3359aa283d9d569d3f1cf9d3515dd89c4c4", 0x80}, {&(0x7f0000000300)="6b121ee28615614cd37a837e3b7ec2ce64bdaaa57bdc596382f4cd69021590a30985b99df67aaef53a179b46782a96ee6a172320a91fbf038381b5ec49240ccbbe95cbad46cc27c0a0bdff1913433204f405ac7c746793c589778c088a61bcc47ddb50d0d235de723b53bf88d58265c6191dc54669e2d9da02dfb0202fbc03aaa3e89238ba2a4ee4940f7192e0da8bb4ed33b12e587c49893ac04119e5455b77f7b978572da9c7d0c426469eecbe1d0026a678b93fff780606ae31594340fe20d83df8b0d8604f3d0bb2d5bb3c85080be6b8dcae51297df139053f9538a0f7e15195321fded97892c342639d5a", 0xed}, {&(0x7f0000000400)="c07d0092a26868116bc5c74f130e19b37d7cc35efab805dbde47020ecac6c2ee96a4d8ae377374cec26a0ea0bb3d3903d76061f442e96d8cfc4c857eec0b00c0816057ae0b1e4a465d374cfb73e34f98e514ec9a27b90a445675fc134b92e4cb0a414abe36e7a94e6b2e4c70ba5fbdef0ce55a6f2ca5775afaa900672a1c6282e6fd5f6ced4fd805c904fdc068bcf20191110f3388892f033dd73c86", 0x9c}], 0x5, &(0x7f0000000540)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1d1}}], 0x18}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000580)}], 0x1}}, {{&(0x7f0000000600)={0x2, 0x4e22, @rand_addr=0x4}, 0x10, &(0x7f0000001900)=[{&(0x7f0000000640)="349dda089598067e5efdffa03a137e248149746aee2e677cd1026e491ffb39df87cc1724e928865f5bc78355781e42d738215bfd026c5b8693c466648ecb645ba86c640ad12d86bba9c154051ca9978218000b9194444344a7815df86ffd1efb38cda589df3440a5524a09b3a55870eaa7a150aea8ad8ffcabecb0ed4cdffe476c6d07dd6798d5d5f55b0f706dc8d2dee3732d2521cb9fde6784eb81", 0x9c}, {&(0x7f0000000700)="296e4fe8de6ac4ef2021e03ac1e251804fde2924d1d398337cc9efac88ef7c2e21adb68ad64b8508f94ec812027cbac06c079f9a55e69b44121d654b76ebffaa5d19b432b853488db385f2c385ab98b113d5805b824fd799512934e37db92edd173162507f49d5", 0x67}, {&(0x7f0000000780)="8cbadcbbc9a84377846ead3d730a41d11d85d4239fd997414690de4cc709695b82229d0623a5ddc71a04d14f370d1a6ecc59633003d3300be950b37a4cf69547d4de4ca9ea425c1420c491b399fd", 0x4e}, {&(0x7f0000000800)="6040c33aaabd2990b94a910d4a4af2d9dba1396d1df638317e7eea2f724b5827054538ad6457a2844fa1d7269ec801ea82e88d43c050dd9f8de6b7e02a991758f86aec0065935be406cf8d8add0aa32fd3ff90afc9e5a632aee2966fa0cd6823ef0588a54016f4b7d85b444866f6e6d78f67c6298005810faacdbfb9120546d446fe0e7d7a41cc5e4da57431e2a14a6960be5a3b989071054f59725e8ce32981060f188f64bb55203e9169f826057f75a59ddd761ee9fc8cd17c24c03035714ef3e4f81d4c8f41d6f05bfc1678d346cfdded9015a16ba9507a18677ccb46409809af835b64598b049db4aa00a242e4d9", 0xf0}, {&(0x7f0000000900)="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", 0x1000}], 0x5}}, {{&(0x7f0000001980)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002f00)=[{&(0x7f00000019c0)="b9a79662aedf3d576bdfd971d05c0dff664c3f2f9684b8bb7a631f91ec397a4b6d2a79cc430a7f495e0d8dbe19ddaaaa23a17a954742bfc0688a2f83c05bb66f95b2a50a67c802b46d33f33f02b93f633a0260d19e30a5c3cbbc7bfc3f06df02f852f88b24275f9de7f2911ecff8360461ccc7c01c9f3cfe21d911f22439b10c4a029f4df84cc4c1541319288c1c96f65912c56d3dae", 0x96}, {&(0x7f0000001a80)="d21c18752771c50e46bb4b5908edcbb23ffbd4595ad67d87ca722b3d8f0a94f26b1016c8942eb8e677b464b3d21cb46e6e854933091f536e5780f972981562e430b694ebdb8a4927cdd09425aff7ccbb9d8e8555310f6680d1b302b5e4dd9fcef4c48478fdb2233a85456ecac845c2b5568c3c351c50c56d4423971a12862effd2ccaa5f5c159e198f39d79fb5506fef26ccb7c0ee66a106795c596fd7d996c89ff9aa11a9d948ca09472426552791089e920725d98bde0180288c27281bcd6e409663a3d6e8075d4be81e95540abdb70d610bdc755dabdb711cb201aa840ddc81c2ada14001f4cc980ee8", 0xeb}, {&(0x7f0000001b80)="73531d7f561757156a32b754f2d6a53941536906a00431b21cd95ffcd4aa6e47231933b177ceb8fc6d46422b4203752ac3b3701b136e6237282a7236513893ddea148057bba06041ee93c9f7f8221601fbadd981706fb4370dc33f742ce03ae7e13b924a427657c704cb0f721298abe6a00895f42fc94d44e7317b581a34c5d5930ea182dc90d809ce049083cb65f239617a45d5ec7ea79abb29d7bbb873241e467b75b5c9a1afb695c3bba023af9e052b9f88cb079d3222eeec9b093bd6032ff1f6a96b134218c2616435b65134bf0933b218b095", 0xd5}, {&(0x7f0000001c80)="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", 0x1000}, {&(0x7f0000002c80)="b1123f9a2af4953c13accd79eff8318d1e14028231abb555a8cef77afe2955d20c8216d846edb25d1d7adeb98bc58fffa8d4ec7f31e0094c03ec9eff14dc9db4b79d6950b647952b1f8ef8bfd2f57dc11fcc44a7b2d82254", 0x58}, {&(0x7f0000002d00)="1738bdd94ba5f2ebd81308a9ebfb5899f1373db8dc8b42721aac088120b8c5b5f2149d0cc9ae59563e64406000", 0x2d}, {&(0x7f0000002d40)="d96c3ca973129bdcf3ce548c2f04962ca47b3dce69d3aa3e5955ff75d7c491fe3cad653b574b25e12c3024f916a18f8fc9f124ceb56fba14d2d0cbd810fbb7ba875ef1b75a5854b71b2162e12b1048215738f4b320531cbdb7749e41fcb5e66f28140e48b6441200d076d3b586a1992d5016a16b0626bb6a7c7a10f29825e14fcebf5d1fd95fa840e88c9854aed757be3aaba844d2af6680dc5b1b2f659b19378158c18fba2716d251289c5d7ba096a7dde80643a70d80257e24efd273323330437f8ae38351a5fa46cac2ae6661f85bc164b6896c9f05a4", 0xd8}, {&(0x7f0000002e40)="7ecc8b0f183eb37e3c0d6856a0806dcf68310997ee908e7294b1d45dbbc0d9d67fbca06cd668a07bd3606d26afe111c3a233b2d6c4f214ab5f2ec49e5384d64b82f5ef1c5f36ca1abff6ca27e43aaecd053317a5abaa4bd408f6cd1fd7dff638e999b918daa7ee964f39c1c4d19a4cb9176dedd35646ed9485bfa6d5f98193c5e9b9d762aec27233fc581c27175ef9b3f30a022627295da04ee513bd857967b66e6ca60c0ba0f9ce94494d1f", 0xac}], 0x8}}, {{&(0x7f0000002f80)={0x2, 0x4e24, @rand_addr=0x7}, 0x10, &(0x7f00000042c0)=[{&(0x7f0000002fc0)="f121e4c227d18460c1a80d8813fbf561f46bfa08e46de2ca6941e93b99874dda1fd18696aa3f13c24dc60e3bf2d18d9286f99ca6a457787a08e39496903f243a5fffc2132e724ab99544a881a187d59bd901279b838916680951498f7f2ee76e1f2d86ace7507a561d713c85c0dceca1e32282a83f6cea453d308afdd6776529a6eec1c1ab9596e7926d7ffa0845065cf99fdab61c3397", 0x97}, {&(0x7f0000003080)="64e9b5fff74257b8018bb097e2e803b19338403984e77858a25f6e0bef44fa5ffe93170235daadba5e43c6adc2829607985b83c8c7d520f4ed50030629ff419dcf035b816d5d6f8bb89b0063d58e98f8990af4e9b59d61cc0ffb36d6fcc5c784030362f2c5", 0x65}, {&(0x7f0000003100)="956e9c864d30b9773a1437f8aa7d791c312ce47e0a7813e1fb2945cb6f94a3f020e0780c82f1132086fb3c6afe2190a5731fc4fb55b42d53edc9a56f4c9d841e1e7ef57217d59ae1423dd679cbbc8f0dd719d2681df3fe68f40e017ee3f1ca3e9c40d304e1d8f7c3795f62d15683cb9acd1c53c4388099c57fbdab3f00db745655b6d982ec7529c1812ff81d4128d70d4fba1d6cfa4c71ff0c849ef869b2dbc62ae9cf5ae61631b1ceba89366cc7ab89c1987a4125557cb585f0f301135a6734f90f35d7ab6b175acd2542f813f97ce16c3507b9c26ee2c4cc36af079f135815e309af3ad143bf3867f7e8952f3b63a2a25d47abaea9968ec6b9e2d3e0ed87fa8627d5ddc492150146c8d5fc3f7efe850768c4e373e1b6791d0f0eb98c6f6633f394dba6f13d756cfe2341a3c52288adf34708a169223ff8334380b5d2b48ffc4c7f2b64f4244877a00dbec1af55373c011d6c347534b75a6120c6f111bdde74cffeeb56c9de9c0bf00709f7e0d75cc44780adb6ce4b1ae1ff12e7afab76545131785c66878647a700718e39d187d511fdf90d52fdf459be57126e1c58a02899207e2c682690901980ae0c749343b40262ae73e6c3f0677a404ee970a48cf43135a9e8f49743c6b93b45cce0a2f67deadd387b201ce89ba158a39ca821bae73ea217ca9da154db62bed57cb66498b332cc003c472f76a923211df6e0d887f3642e53f52a93b25a29c706f267bb58462959f533c421bef213945dcb0ad6ec385dc9ce15876509e94ed5a0d7d68ead635483f69b04a632da45705aa4ae0034ad4049f4aadd2f011bd903282d365333819ff78255282abca94c7a03ff83a8c66fcdaa9ea3b9652facf16e9919706f8ad910a1b37cf6cfdcc0973535d3798c83c87da5bf8d2fa7e16ba0dc3b7ce5d13b1cc771f573b11bb5d93470a6e1dbd756a5f38ff36c252897d59cfb2e8c3ad9e7adffb3f3e74a5b25f88527822cef655e81514235b254bebab3e1daa21f40f47026c24e886e217531084576e685cdbb174dd2a0b6bb689645aa1dd050c0ddd1f9c737f8c084c5ea1253e7e65dcee5683f5fde1c9c5b235e602777deaa5363a78410b5fda9941a7f1067e019bb0805c2238d3f388fcdde303919bf38d756df0353cda592d087d7f548ceb68584a876e9e7c2475d33316d48666a413c58f0d3e964d74f9e909f5987c58fe193e6fc0d23da2d08c7cd5f19ba3fbdef144fff3f02a74c76366f81179b1ba8ca007d52a5dfd6becca57c5a6d334548bfbb76d9989b1431bcc4ad60f652e7da9fe45df14e9a613868479c5a68d6642c7a422f6790300f92a710fc27e159dff137bcc1209df7b85c7dfd9f4ab028f730e88c31790cc7c122c8d2f0ec80a0d89cb2f3c152cbb748c1583baaeff5a7bcd909b7051f575490284accae08b85cf00301303f6c187dfa93e8b52528aa557b2bd496f2d161281d42c18c8f821e13c6db68c6c81bf8f09cb6455fe69d2c5e45c9a225e69babfc3f0e6a78b4b0e9c7cbdb7263d57f7899eb9270bd5d6e282cd1aa8c8b013a0c0f9c198f479a7b60e3f1898c5f3338c95addc805a393ba330ce2ef56e8854db7666a0487fdfa9281d8ad53514ce05ad62b3b0515454bf7e721856a7d6bd853e152432a42c3408101a00e8ab8196025dacc49557ab06f8b8ff76dc1dec7119345811c002feb9cc584247fb0a77d41b310579fdc3d45b4b68c1006d160d0d5329028d0c9fd307a951a8ce98f661e5faa06908f3fc8885f2093620c7978ee70a72407d310334daf5b0bab81f14ab098e0f7adfa84b83e38d33050328cff30bc7a46002bfa47db9d6f83cf4d005356c2e236c0aa6e84f73ee440d9c7a7b50be6080f68175f04cecd07125d668a4089abb457c24a12af20331c472f71e9acc223b2517161228b304122593b80b891e959e7a34c6e7b362ba3bed9c00b696837b297e04d6b93c5ae37ae3a4373c20812f08b10dbf3a93c17cad9c2baf26c8c28a3bf5e29f9e198e6cd23ed30ef3bef02134f3cc8158b8875f4adc9670b50c71109340f3ea399f40b50c91355874e54c4c31fb720af24c8fd4ab67fc4e16ec5f77c81b5b7a31612acc7cb51a8b9d0d1dd237b1166e79d6e798be8c95fd5a84adcf7f8461bc24b0376e855727b3dab5dd6e0bf42853f3c57d0a717326fd7fb33791728110640a194b4651a2d10416949c1515a71fe5ca8f7e6254d977b00368d85d0cfa9f8e2734175e3bf8419757a9a775db1bf58296f9aaebec3afcf36704245a90208e8eb94de5d29ec7937337319eb2f3c304b0549d8b058ec78d466544e84bbbb10c18e3007c5adc1d29f9b73303152aa877c03b1f2ab4c630c7f0c16e8efad9c8850e95d22f1c8b4a08e9564d061a81b5849bc699ef554f650bedb7cc6f03d205fd9e2a4d223f15491bbf197affb49d28fec06a93c87c683d5f544de37da127b8522243721c290cb8f2d1732bba55152acf1bcb85b5ea3aeecd712373baa3105ce55912960aefa8d89d7ea8ec2ab01d2c48f703dfc7301784ddf3c1b736f6a25415e866f27f4952c3cb11f7e78752c277fb1e27de7496bf22a33e1a23a1ff3e18342c759d9727b40da810a6654ed2fd6603937abfba09576219092ee680b1f82b993695dbc490ac96e30c08120da26a0af026ca4d317305a3cabc333a3d665753c5b454c25761fdcbcc6d5b9aa1166f17bbb30132745a9ee9a9946517f163962129edb0880c0b35fc1730a4d9f93a3045ed262987e550d0fe412774127f314f98dba6c479ae018ae31d0776c6520d8e16dce5418d076e1ca159c245ace62922920fa80cc58733600c749b74df02865225779cc614feb9b5386829aa35a5e64af7ca5d2549e298290dedc1201394efa6ecde3e01a9e555cc3f49427b29fcbdf1110682964484c3c14cdd42e90df378e2245f1824e6d72ab15f01d20e475f5f6e2df23c8f429ae14bc9be403b3805e9a05486ae036d3645a459fb02955434ce576f122853b21e4f608f25e3cf0c448ca6107f8cfc12d64603c39462cf3fa380338a6efa4015838325e6a7d140cf4f530d77499043d324bc3b657bcfc623e7ae110ea5e2e71890a042e080f13e1c9dcc8f9bb3c0d75b63e84632ff8e34c924895acec4a6741f6a74286471785912d56304545920344f7f3cc90829725c6f020dbe8a2fbfe5cdd7e37b46ab110558b210c19a624ab7378a5d74280d45fa03c9dc4ee7241d6ee5218a03ce11ce66a04027abdf8380f714af31fd24fb958d9f2776f5947af88b33d8faaee7fe62cd7ade99e6efe171165ec0fd0120a12b3666af1b214446928a310fd3e3a420750dc8ac748a2d39bdb2453cd5c0193ad1b3f5eb163695ad99340e5cdf2e31c8a3feb00451ea906615f82ae235c43e72e7aaf5f2e6e0bbf8d68f7b6c2909dee58c4a568266083ea896d8b4ac42b5d914b204f2ce8d6b3193cf2ddafae8b9e376123514f6e51414a22092a111e8126be9afd7cece85f818c2499cabfc008f294ef790427b9e945ae58ee3a5927017e310a4b296792cc6ca08bde29ba16cf88575751cfd7571257a3d20f25a2876cd14db0038f6bc5841fb8822c2c332c0499b68b21ff33dfa223c0d5da55446028844e595e0e5e19fc0877647fa95163a150a3c626bef9ca58dc279cc859291f5abf8aa440fb393f13bf697ee469d82310985bc25fa38ed0140a8d10cb788fac51c4bcdcabab3aee76c448a6f07a4dd55e3bdda6af558e581f304c3af331964291e678443ddeb7e0562f112fc6a8cfeb382a1816bf59e6ee50b3fc42dbd56961d781ba0e3d3a9a5e083fa6b27e97395f81c64195ffa0adc7ed1e1df972c5420af32b4f61b7669d34e54264cf5d2b0e08267385fa8bc2c5b649667a5ce6c72e1ffd4238c0e2743c2af28f35535a47738b856bfc46173f1e986a4105a5c911747ecd274553ba904ab967fdb5d2439830a6b575e16192cc6c34be3f5cc6f8e26bb78f33919ad7b447c98b8e6d2817d0fc86e76f9cd4eb8b658e5e429a7ba9779c1df424e8c88c16dfd5b3fbd826f9a6d760d3c4719bf9cc1c4659b9e314f15c0eb065906cbb629b4152be864b64fe1d902fe833e1a347afaeb5ac6ffd57173a6d6ca8aef5367fa2ccfdb167e0d5ed30c1403010cda41beac8564e54472394b3b89ffd423ccc7d294b9902941d25e5ecd3a79c1a890beac801e201dcdb82d6d165966115745cd45d52103047f8b13a589334ee10b68e4db7acbcdeeba4c4520b4e6b4c0ea2ffaaebf034c208f4e3539c89bfbdeb9bfd654b9a9daedc18a2dea50b9ee816b71c954328f54c837ef88278c0ff1d058868a409fe9bfbb11fbffc55b7b1cd7410dfde7fb4cbb64a64f690b7a374aa23230b9eff6e300f3ae75c6270f7fe041979e7fe531e32faffcd79a4648d6ba64b7c3998646df12c56cde84b9b2d44322175742a6591a065123c0f40258813491c1b8eba967be3767f5c25b9427db8b4378d3fb2a5c8abbd24d47d00689d0fbc4b741bf4796d25dad904a82e16501c00bbb40d9f542adb15b7d32b8c6dd6c83859059c6f0bfa5fa38fa5e89d7598246c58f734b725b678a74a82cbfc23a6c3d13fbb23b262b571417c81ebe3d09a241b6654f36d049702ecf01a6b6d21f686966525615990d941e7bf4bd0b8bdfd614077f9d938ffaaa3dc548e963918048c652aabb7bd420a15136a7df1bec483b32b6c6640cf423ee3de5f817cea0b5dde25536f9ba1a435fd3131a64abdbfd7a1b6e3e3057fdb2a60c0448e41a3d5fc7c69005f91271dec887300a4968b19e35a92eb9e36c9e31dd4eee22811817c42e3b914830840979a4fe0c2d834f2acdd1847dbb6f342025f0772e4a773f6b5c96527500b78cb173326ed589f7ef49c859233a4140031d34e2020b3fffd4f057723e07156aed9bc9a8395f9ccc5889b1e3c59a4146737b05eb9e6eef3a3062ea581574efc3ee465db63e8a4a199066a904e71c6753ac57f5f67d821526f1ca411ca35e80b6fdd355ae6573313af1f25c1f4c9d231a28ba52adbd605e430bc8c65997cca83e4a139e2ac80b7d665689eae65a1d98780140f533b5d0b1bb84951f871c3e1fbb4f87bfe1dcf8224d3883977a9ecc752198692d8f8062614fae6477e948c51e049511a78d83cd9e76de6af74e593211df5d54f12380cf2f9260f4b1800601b544340c87f18860ea12566382d0f58c9f46187f562509944b869eb9620873b6ae655f2b0326e42594009e4edb3ce7ea1380acce9492e25bad244e282082bddafdeac649fc57b77ee9b4b987c4aa94456e681136a5d0096d1080dea11ae67597532cefeb394d4384314ace684e75ab9e48daee3ad109887bc22a202a4794d9ae6e169b432a43a41dcca80866cc11186eaf5aac30711709e2a5fa01df6eef94dcf6ea0ad8504cd6a7cee82a655b0d2f273fe3a0a58b28af60282d3890e6280a45dfd39e2ca8094b8dff7fe88e37613d818d468b8907eeb0deaee91f47fc00d0e1228acaa5fd4c0b751f6cdb7e3a9bf0c862a1849fbbd552ccb702185eb3cd90f3fd8da37e06526a289e3b7eb92ff446dc75b23857eac5d78078a8c31c3165262c7649506bcf29482408e7628c337d66a1f7065301c11f3b3d09be4dfe16a1dcfde335f27b872bc2ec9505d5dc5dd9b177be5a7908274b45d9fff1cc8db6003bdc75e2718adb93dc26e06fbb9c829f6420f6975d05dbb06b8e0b60a62b0e90faac55d58c516d3fef1263a163e8736acf1aee6133d0253c5ed41da1986fd90a283dc99cf675d8ba6696af0e83b3b33", 0x1000}, {&(0x7f0000004100)="36a6510c3eebbc5d1ff4b14cd60820efb1e2a0e5bb9a2e979c893d195dd4471998c3b8423159b60a4e13a39aaeacfbe387b29e1376d61e21990db7b5738ae03fb4b451d53babc59b82b2591c7d25898f6bcb522ba73d0c0331d8c03450deb396bf", 0x61}, {&(0x7f0000004180)="1bc231be412c09e304c325697b549f849b7be09cdb13c5a86d031ab5e1eb28deb5f9ba963a74bea757c3274b68c17fa9f54ecc9a3e829453c6fd3fecd309af39f07eaf28f060a976c63db66bbe266f0f9afac2ffc56554f5eab8cdb129e51c7afe53827bd8f191d94f656029645c2603ccfd60f8e99bf7167e67b1e2cf29420f44f9b8c36a1d9947b313", 0x8a}, {&(0x7f0000004240)="4bb2027dcab3888c7396d1a6d5f8695eac3ac45d21787278daf9eaa38cbed030355ae5e0772ed00a067898a68fedae9e948fb17d425751399e2db666f8ba29834cf55d7c7236808bd48064ab3497f18d4ab9af8414007ec1b703a6", 0x5b}], 0x6, &(0x7f0000004340)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@end, @noop, @ra={0x94, 0x6, 0x8}, @lsrr={0x83, 0x1b, 0x8, [@empty, @remote, @local, @multicast2, @remote, @loopback]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x14}}], 0x80}}, {{&(0x7f00000043c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10, &(0x7f0000005500)=[{&(0x7f0000004400)="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", 0x1000}, {&(0x7f0000005400)="12bd6016f23e66cd7c0a152303bd961e7bfd58a5b75f460998910a1481c2be470f4159bdd17aaf5364a0e3d187882a902212de55d6665f4923ff0a770db2088f632a9a061ab009bf8b609eb20a949b5a79d5c51bc3c7d2a52732d955c0ea", 0x5e}, {&(0x7f0000005480)="bb981e18d57925664ccd00905d3849ee0457f64d1009bd2d10fd61dda0ae1db486ec92705155c87ecb6591cbbe1f6c8da7593bffe5e13b40025a905675cf8ae134cb417ee9e4324804cbaff430386c9ed88c3d41f89023e7c362c9cba7a996c5b035c02cd301cf1a343a7ce3083b9298c7c1b40422d52eeb", 0x78}], 0x3, &(0x7f0000005540)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffffffffffffffff}}, @ip_retopts={{0x48, 0x0, 0x7, {[@cipso={0x86, 0x28, 0x800, [{0x7, 0x5, "b4fb2e"}, {0x5, 0x5, "fb57cd"}, {0x6, 0x5, "965610"}, {0x0, 0x3, "7f"}, {0x0, 0x9, "8d5a336b13f591"}, {0x7, 0x7, "ac70e3658e"}]}, @timestamp={0x44, 0x10, 0x400, 0x0, 0x2461, [{[], 0x2}, {[@initdev={0xac, 0x1e, 0x1, 0x0}], 0xe17}]}]}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x9}, @rr={0x7, 0x17, 0x7fff, [@remote, @multicast2, @dev={0xac, 0x14, 0x14, 0x1b}, @local, @dev={0xac, 0x14, 0x14, 0x24}]}, @ra={0x94, 0x6, 0x1}, @end, @timestamp={0x44, 0x10, 0x4, 0x3, 0x401, [{[@loopback], 0x467}, {[], 0x7}]}, @generic={0x0, 0xe, "2dfd89801ffd01bb54ca914e"}]}}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x128}}, {{&(0x7f0000005680)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000005900)=[{&(0x7f00000056c0)="9b5a776be3586bcdb99a91ee", 0xc}, {&(0x7f0000005700)}, {&(0x7f0000005740)="a878108e37f9153a8dd16823bdcb04bca7cd4cd6c0791180c7f3528cfb5e37160a1a9e9020752884e6aaa0240c945a8ba2668ff4f53c9edc5cc5f40b99426eab7fe5e38bb35bcc619f373ffa166b0b98d521cbbbd9606d025afe1709ec55e5abe89b54c139a87c8d7326d7be630a64", 0x6f}, {&(0x7f00000057c0)="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", 0xfe}, {&(0x7f00000058c0)="ea6c85a4", 0x4}], 0x5, &(0x7f0000007100)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3e0000}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@ra={0x94, 0x6, 0xa0}, @ssrr={0x89, 0x7, 0x2, [@broadcast]}, @end, @timestamp={0x44, 0x10, 0x5f, 0x1, 0xff, [{[], 0x7}, {[], 0x19b}, {[], 0x5}]}, @generic={0x9f, 0x5, "cc7f02"}, @rr={0x7, 0xf, 0x2b2c682e, [@multicast1, @dev={0xac, 0x14, 0x14, 0x18}, @rand_addr=0x733]}, @ssrr={0x89, 0x7, 0x5, [@remote]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @dev={0xac, 0x14, 0x14, 0x27}, @broadcast}}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@rr={0x7, 0x7, 0xfffffffffffffff7, [@dev={0xac, 0x14, 0x14, 0x13}]}, @rr={0x7, 0xb, 0x80000000, [@local, @local]}, @timestamp={0x44, 0x8, 0x2, 0x1, 0x6, [{[], 0x100000000}]}, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}], 0xd0}}], 0x7, 0x20000000)
syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffe6b, 0x6d, 0x0, 0x0)

[  251.044066] FAULT_INJECTION: forcing a failure.
[  251.044066] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  251.094599] CPU: 0 PID: 13663 Comm: syz-executor.5 Not tainted 4.14.135 #31
[  251.101756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  251.111135] Call Trace:
[  251.113733]  dump_stack+0x138/0x19c
[  251.117376]  should_fail.cold+0x10f/0x159
[  251.121531]  ? __might_sleep+0x93/0xb0
[  251.125430]  __alloc_pages_nodemask+0x1d6/0x7a0
[  251.130113]  ? __alloc_pages_slowpath+0x2930/0x2930
[  251.135138]  ? lock_downgrade+0x6e0/0x6e0
[  251.139301]  alloc_pages_vma+0xc9/0x4c0
[  251.143276]  shmem_alloc_page+0xf6/0x1a0
[  251.147328]  ? shmem_swapin+0x1a0/0x1a0
[  251.151299]  ? cred_has_capability+0x142/0x290
[  251.155887]  ? check_preemption_disabled+0x3c/0x250
[  251.160900]  ? __this_cpu_preempt_check+0x1d/0x30
[  251.165736]  ? percpu_counter_add_batch+0x112/0x160
[  251.170744]  ? __vm_enough_memory+0x26a/0x490
[  251.175235]  shmem_alloc_and_acct_page+0x12a/0x680
[  251.180160]  shmem_getpage_gfp+0x3e7/0x25d0
[  251.184485]  ? shmem_add_to_page_cache+0x860/0x860
[  251.189408]  ? iov_iter_fault_in_readable+0x1da/0x3c0
[  251.194590]  shmem_write_begin+0xfd/0x1b0
[  251.198730]  ? trace_hardirqs_on_caller+0x400/0x590
[  251.203739]  generic_perform_write+0x1f8/0x480
[  251.208322]  ? page_endio+0x530/0x530
[  251.212135]  ? current_time+0xb0/0xb0
[  251.215927]  ? generic_file_write_iter+0x9a/0x660
[  251.220765]  __generic_file_write_iter+0x239/0x5b0
[  251.225687]  generic_file_write_iter+0x303/0x660
[  251.230445]  __vfs_write+0x4a7/0x6b0
[  251.234151]  ? selinux_file_open+0x420/0x420
[  251.238555]  ? kernel_read+0x120/0x120
[  251.242437]  ? check_preemption_disabled+0x3c/0x250
[  251.247449]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  251.252987]  ? rcu_sync_lockdep_assert+0x6d/0xb0
[  251.257732]  ? __sb_start_write+0x153/0x2f0
[  251.262048]  vfs_write+0x198/0x500
[  251.266585]  SyS_pwrite64+0x115/0x140
[  251.270374]  ? SyS_pread64+0x140/0x140
[  251.274254]  ? do_syscall_64+0x53/0x640
[  251.278233]  ? SyS_pread64+0x140/0x140
[  251.282117]  do_syscall_64+0x1e8/0x640
[  251.285991]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  251.290831]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  251.296010] RIP: 0033:0x413777
[  251.299186] RSP: 002b:00007f498c7579f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[  251.307060] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777
[  251.314332] RDX: 0000000000000040 RSI: 0000000020000080 RDI: 0000000000000005
[  251.321590] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 0000000046505845
[  251.328847] R10: 00000000000001c0 R11: 0000000000000293 R12: 0000000000000005
[  251.336108] R13: 0000000000000005 R14: 00007f498c7586d4 R15: 0000000000000004
[  251.410631] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  251.431705] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  251.456021]  loop1: p1[EZD]
[  251.490876] ldm_validate_privheads(): Disk read failed.
[  251.496314]  loop0: p1[EZD]
[  251.499246] loop0: partition table partially beyond EOD, truncated
[  251.588597] loop0: p1 start 1 is beyond EOD, truncated
03:26:24 executing program 2:
sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r1 = dup3(r0, r0, 0x80000)
r2 = creat(&(0x7f0000000100)='./file0\x00', 0x140)
setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x4000, 0x0)
futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0)
futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0)
write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7)
futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0)
exit(0x0)

03:26:24 executing program 3:
r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0)
r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x517602, 0x0)
getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x4, &(0x7f00000000c0)=0x2)
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={<r2=>0x0, 0x1}, &(0x7f00000001c0)=0x8)
setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x6a}, 0x8)
ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{<r3=>0x0}]})
ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000300)={r3, &(0x7f0000000280)=""/76})
getsockopt$ax25_int(r0, 0x101, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x3)

03:26:24 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040))

03:26:24 executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x34e, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000be00000000d7000000100000009500000000000000"], &(0x7f0000000200)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x70)

03:26:24 executing program 0:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000008500)=[{{&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000140)=[{}, {&(0x7f0000000240)=""/225, 0xe1}, {&(0x7f0000000340)=""/229, 0xe5}], 0x3}, 0x4}, {{&(0x7f0000000180)=@alg, 0x80, &(0x7f0000000540)=[{&(0x7f0000000440)=""/244, 0xf4}], 0x1, &(0x7f0000000880)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000600)=""/244, 0xf4}, {&(0x7f0000000700)=""/234, 0xea}, {&(0x7f0000000800)=""/23, 0x17}, {&(0x7f0000002880)=""/48, 0x30}], 0x5, &(0x7f0000002940)=""/105, 0x69}, 0x2}, {{&(0x7f00000029c0)=@alg, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002a40)=""/24, 0x18}, {&(0x7f0000002a80)=""/119, 0x77}, {&(0x7f0000002b00)=""/57, 0x39}], 0x3, &(0x7f0000002b80)=""/229, 0xe5}, 0xffffffff}, {{&(0x7f0000002c80)=@rc, 0x80, &(0x7f0000004280)=[{&(0x7f0000002d00)=""/188, 0xbc}, {&(0x7f0000002dc0)=""/104, 0x68}, {&(0x7f0000002e40)=""/188, 0xbc}, {&(0x7f0000002f00)=""/108, 0x6c}, {&(0x7f0000002f80)=""/100, 0x64}, {&(0x7f0000003000)=""/90, 0x5a}, {&(0x7f0000003080)=""/240, 0xf0}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/236, 0xec}], 0x9, &(0x7f0000004340)=""/123, 0x7b}, 0x1}, {{&(0x7f00000043c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000005440)=[{&(0x7f0000004440)=""/4096, 0x1000}], 0x1, &(0x7f0000005480)=""/4096, 0x1000}, 0xff}, {{&(0x7f0000006480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000068c0)=[{&(0x7f0000006500)=""/153, 0x99}, {&(0x7f00000065c0)=""/84, 0x54}, {&(0x7f0000006640)=""/5, 0x5}, {&(0x7f0000006680)=""/56, 0x38}, {&(0x7f00000066c0)=""/8, 0x8}, {&(0x7f0000006700)=""/24, 0x18}, {&(0x7f0000006740)=""/225, 0xe1}, {&(0x7f0000006840)=""/94, 0x5e}], 0x8, &(0x7f0000006940)=""/215, 0xd7}, 0x800}, {{&(0x7f0000006a40)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000007c40)=[{&(0x7f0000006ac0)=""/114, 0x72}, {&(0x7f0000006b40)=""/4096, 0x1000}, {&(0x7f0000007b40)=""/29, 0x1d}, {&(0x7f0000007b80)=""/29, 0x1d}, {&(0x7f0000007bc0)=""/124, 0x7c}], 0x5, &(0x7f0000007cc0)=""/122, 0x7a}, 0x8000}, {{&(0x7f0000007d40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f00000080c0)=[{&(0x7f0000007dc0)=""/52, 0x34}, {&(0x7f0000007e00)=""/145, 0x91}, {&(0x7f0000007ec0)=""/54, 0x36}, {&(0x7f0000007f00)=""/58, 0x3a}, {&(0x7f0000007f40)=""/184, 0xb8}, {&(0x7f0000008000)=""/183, 0xb7}], 0x6, &(0x7f0000008140)=""/162, 0xa2}, 0x100000000}, {{&(0x7f0000008200)=@tipc=@name, 0x80, &(0x7f00000083c0)=[{&(0x7f0000008280)=""/246, 0xf6}, {&(0x7f0000008380)=""/29, 0x1d}], 0x2, &(0x7f0000008400)=""/241, 0xf1}, 0x1}], 0xa, 0x140, &(0x7f0000008780))
r2 = syz_genetlink_get_family_id$fou(&(0x7f0000008800)='fou\x00')
sendmsg$FOU_CMD_DEL(r1, &(0x7f00000088c0)={&(0x7f00000087c0)={0x10, 0x0, 0x0, 0x540000}, 0xc, &(0x7f0000008880)={&(0x7f0000008a00)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="000429bd7000ffdbdf2502000000080002000a00000004000500"], 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
write$FUSE_INTERRUPT(r3, &(0x7f0000000000)={0x10, 0x0, 0xfec5}, 0x10)

03:26:24 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000100)={0x0, 0x4, [0x7]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x400)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:24 executing program 3:
r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000))

03:26:24 executing program 4:
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x440, 0x0)
ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000740)={0x0, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil})
r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x312daae4]})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000080))
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0xbad}, 0x10)
sendmsg$can_bcm(r3, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0)
sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
tkill(r4, 0x16)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e31, 0x0, @local}, 0x1c)

03:26:24 executing program 3:
r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x1a1200)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="350800e2", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x2c)
connect$caif(r0, &(0x7f0000000200)=@rfm={0x25, 0x9, "b3d40ed02d4b6b7db5197a1d8a3da9b3"}, 0x18)
ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0)
ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0)
ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000440)={0x7a, "025ce7727d5cb42d8f1ba5dc0b050200000000000000407727c5e40555d6f94c7e26fce25929cee8a0525b4c7930d2d298c8997970cdcaddf0b964439250051d0ba5679ce360a51303c1883c19951af385355181bab520f166d5f85bc2093473fe7aabb6ed4f6afd9c749f8bffce1c34f0a700891a98d59a894b7d32479b00"})
r1 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10)
sendmsg$rds(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0)
ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f00000003c0)=<r2=>0x0)
ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f00000001c0)=r2)
ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000240)={0xf, @pix={0x3800000, 0x2, 0x32314142, 0x7, 0x10000, 0x0, 0x9, 0x80000000, 0x1, 0x3, 0x1, 0x7}})
recvmmsg(0xffffffffffffffff, &(0x7f00000053c0)=[{{0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={<r3=>0x0, 0xfff, 0x30, 0x3, 0x4}, &(0x7f0000000180)=0x18)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000500)={r3, @in={{0x2, 0x4e20, @multicast1}}, 0x100000000, 0x3, 0xa8, 0x100, 0x40}, 0x98)
syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x2082)

[  252.801948] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  252.824140] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  252.824328] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  252.845568] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  252.849579]  loop1: p1[EZD]
[  252.866245]  loop5: p1[EZD]
[  252.874131] loop5: p1 size 2047 extends beyond EOD, truncated
03:26:25 executing program 3:
capset(&(0x7f0000000580)={0x19980330}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1})
r0 = socket$inet(0x10, 0x0, 0x8)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00t\x00\x00\x00\xe4\xff\xff\xff', @ifru_flags})
r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffff01, 0x200)
ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x1000, 0x4000})
ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=<r2=>0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x7ff, 0x5, 0x202, 0x3, 0x20, 0x200000000000000, 0xd33, 0xd35, <r3=>0x0}, &(0x7f00000001c0)=0x20)
setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000200)={r3, @in={{0x2, 0x4e24, @remote}}}, 0x84)
sched_setscheduler(r2, 0x5, &(0x7f0000000100)=0x7ff)

03:26:25 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:25 executing program 0:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="738d626a5f757365723d5d2c00"])
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

[  253.042940] audit: type=1400 audit(1564716385.095:73): avc:  denied  { create } for  pid=13811 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1
[  253.231115] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  253.255812] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  253.266324]  loop1: p1[EZD]
[  253.310761] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  253.327923] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  253.367208]  loop0: p1[EZD]
[  253.376185] loop0: p1 size 2047 extends beyond EOD, truncated
03:26:26 executing program 2:
r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xb673, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000040)='\a\x00', 0x9, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x2, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x9, 0xfffffffffffffffe}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffffffffffc, 0x0, 0x1}, 0x10}, 0x70)

03:26:26 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='<ubj_gqer=],\x00'])
socket$bt_rfcomm(0x1f, 0x0, 0x3)
syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00')
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:26 executing program 3:
socket$inet_tcp(0x2, 0x1, 0x0)
sysinfo(&(0x7f0000000000)=""/22)
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0)
r0 = socket$inet(0x10, 0x2, 0x0)
r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x400, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8001000)
kexec_load(0x0, 0x8, &(0x7f0000000580)=[{&(0x7f00000001c0)="10f7d05138e9adbbeefde29d218871a6118830b91b1913f7af6dea4eef95fa289214911a36219e0e49f902ac68332999e65875a5ab7dd204186cd519d8f6ccb26817b503fc24b00afed46aa37b674caa48f4d44510d9064e1dbbe3576e20658a457471c47daeab644c33f53e3ef0a64c153abf53d926390ca347e512e6dd827decf8d2b2dbcc14f17f116c14e54460f20ef39a19ea4db565c0088c38fe36bb90145b577ec9edf08ebe2bb9", 0xab, 0x1, 0xffffffff00000001}, {&(0x7f0000000140)="3663e5f1c1c1d7c468645f492e2fb2561624f12190625cee2120", 0x1a, 0x20, 0x4}, {&(0x7f0000000280), 0x0, 0xfffffffffffffffc, 0x1000}, {&(0x7f00000002c0), 0x0, 0x8001, 0x6}, {&(0x7f0000000300)="fb5bd5786c3ff409c64026498420e4d68123806dd60ab31ba146c2148f8eca4dc274123da354a03f326a20839595018f", 0x30, 0x401, 0x70c9}, {&(0x7f0000000340)="8880170ca1371f2282e7b7b55cd9be2c1e85ab34c31e92e6439d6079db5d7abaea56b65759e26e2919f3325676eae332e028769b13e5f4b79d7b601dd4db0e0c4c0aa45861c468a5fe73ccf1fa66682a483d3aac4d8e6cc0af07b4f91e00767ead07fa0d6a6bf0c4eb375b1f301992ea5c4d3bce7ac75f72af2ab9ed818386a7bc99e9136bafd87eedfa9fb287a08e2852da331a21888b61ad6077c0a00e3e47d58dd9f7f3d6744d3f00b83f458eba939a35251ec3e394f687268c0b0f131d748ee16b09c4f05e7b30eae7f117937caa32d17710319ea12038d85d0020a70aea19c576f62df3a2bca483e80bc37360", 0xef, 0x9, 0xfffffffffffffffc}, {&(0x7f0000000440)="66b8d60685782b977847af2d9361c05346bb510b533a2efdd49e82dfddd1a0721e78cf75e1e63830bc2c946fcbd0f1594f77befa9b435bfdc7e08a9c89422debe2c36038d2c8db5009b0a5ff2bd93c89aa16d687763f75a48bb1d769", 0x5c, 0x5, 0x1f}, {&(0x7f00000004c0)="c4039168e46012b2cd88a4f2e6fab243013fb1009df28679db1370000bc1d78043ec8cdd215a8f062177c1c49862e6fe4e2a02b2a5260743fa6cb37406d4582013f33a672dc152f6d20c22238c357fe7eb8df05f9bf4667847d1c7b8ca56c63a7a1b625ee477b44a36c84fa596f89b5b4af076a64bcddb02277b796e6cf3a93c7995feea4f688ab31744982b7a7c2164184de5ab26f21d0563f7d6d5e80936dfff3f", 0xa2, 0xffffffff, 0x2311}], 0x3e0000)
inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x2)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000007c0))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast2, @in=@empty}}, {{@in=@dev}, 0x0, @in6=@loopback}}, 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f00000000c0)={0x0, 0x0, {0x3144, 0x7e, 0x300b, 0x4, 0x5, 0x3, 0x3, 0x2}})
r2 = shmget$private(0x0, 0x4000, 0x3f, &(0x7f0000ffc000/0x4000)=nil)
shmctl$SHM_LOCK(r2, 0xb)

03:26:26 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r2, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'wp256\x00'}, 0x58)
ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e)
r3 = accept4(r2, 0x0, 0x0, 0x0)
write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYPTR], 0x8)
splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0)

03:26:26 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:26 executing program 0:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x1080, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:26 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x0, 0x0, @ioapic={0x1f000, 0xfffffffeffffffff}})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x1, 0x100000001, 0x9, 0x9228, 0x290140000000000, 0xe0e, 0x6, 0x4, 0x3, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x4, 0x3, 0x100000001, 0x3, 0xd7], 0x6000, 0x240001})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[], 0x0, 0x240})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x5, 0x0)

[  254.403735] QAT: Invalid ioctl
03:26:26 executing program 2:
r0 = dup(0xffffffffffffffff)
ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0xca)
utimes(0x0, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x3000000000000}})

[  254.490481] QAT: Invalid ioctl
03:26:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', <r1=>0x0})
ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@mcast1, 0x10, r1})
r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0xe43f8b29af442d9e)
ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000080)={0xf, 0x5, 0x3})
ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={@mcast2, 0x0, r1})

03:26:26 executing program 2:
r0 = gettid()
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc))
r2 = syz_open_pts(r1, 0x0)
ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2)
socket$nl_generic(0x10, 0x3, 0x10)
read(r2, 0x0, 0x82)
tkill(r0, 0x1004000000016)

[  254.562095] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  254.598855] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:26 executing program 3:
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
r2 = socket$rxrpc(0x21, 0x2, 0x7)
accept$unix(r1, &(0x7f0000000080), &(0x7f0000000140)=0x6e)
sendmsg$inet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@ip_tos_u8={{0x11}}], 0x51}, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5)

[  254.620833]  loop0: p1[EZD]
[  254.621049] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  254.637536] loop0: p1 size 2047 extends beyond EOD, truncated
03:26:26 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x0, 0x0, @ioapic={0x1f000, 0xfffffffeffffffff}})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x1, 0x100000001, 0x9, 0x9228, 0x290140000000000, 0xe0e, 0x6, 0x4, 0x3, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x4, 0x3, 0x100000001, 0x3, 0xd7], 0x6000, 0x240001})
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[], 0x0, 0x240})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x5, 0x0)

[  254.663335] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  254.673215] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  254.695366] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  254.710410]  loop5: p1[EZD]
03:26:26 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
listen(r0, 0x4000040000800)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
r2 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000280), 0x4)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000055}, 0x98)

[  254.732541]  loop1: p1[EZD]
03:26:26 executing program 3:
io_setup(0x0, 0x0)
r0 = socket$tipc(0x1e, 0x2, 0x0)
r1 = accept4(r0, &(0x7f0000000200)=@can, &(0x7f00000001c0)=0x80, 0x99359a694880bf26)
setsockopt$inet6_tcp_int(r1, 0x6, 0x4000000000000017, &(0x7f0000000080)=0x7, 0x4)
r2 = syz_open_procfs(0xffffffffffffffff, 0x0)
ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0)
r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x200, 0x20)
r4 = dup(r3)
dup(r4)
mlock(&(0x7f0000bde000/0x4000)=nil, 0x4000)
clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
readv(r5, &(0x7f0000001700)=[{&(0x7f0000000280)=""/127, 0x7f}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/150, 0x96}, {&(0x7f00000013c0)=""/160, 0xa0}, {&(0x7f0000001480)=""/220, 0xdc}, {&(0x7f0000001580)=""/130, 0x82}, {&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000180)=""/13, 0xd}, {&(0x7f0000001640)=""/94, 0x5e}, {&(0x7f00000016c0)=""/59, 0x3b}], 0xa)
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3)
r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2, 0x0)
ioctl$KVM_GET_PIT(r4, 0xc048ae65, &(0x7f0000000100))
ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x24, 0x5, 0x5, 0x8, 0x5, 0x466d0ccd, 0x5, 0x11c, 0xffffffffffffffff}})
ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, 0x0)

03:26:26 executing program 0:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
r2 = fcntl$getown(r0, 0x9)
ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000340)=r2)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:modem_device_t:s0\x00', 0x24, 0x1)
clone(0x114200, &(0x7f0000000000)="b9c42345ffb092c20e103282f74d4575941b37b748ec1695f2b91a02292d4c2883", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)="2202776218ec27de9298a0bcdc02a2d2c85cc84e444f083a0c766d5dac9da14ca559bc7bcf0554b6bba51f07a88b0351576761dfd07e7719342c3c78d3944b43a9dc808ed93ca31d577693e90312395f4ac0cc5e0b9e449c172dbadf1bf446679e019d523ad84c5896dfeb4003105a9742c9bf4a0c1c3f8320ffb0b15ec3b456c72ca6a9613fa943cc2d15e9d7d93c9064b231ae51445debcaadf09a94c1cd0256c936890cfd5ea2449920ba36d9a45a6d0089b7954a22675be5d31de2dc4b373fede5bc4478518093872feba5fc6c822b89aaf0ac6f664cd37d9aa95efd68acb35114cd0fe830e1f30512074aa6e1b024f0")

03:26:26 executing program 4:
r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "3206a3286468c22c", "5d5083c05eea284eca669d62bac8c3c4dcf713dc8430dcec046501fd7b8737ad"})
r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x40)
setsockopt$inet_buf(r1, 0x0, 0x3f, &(0x7f0000000040)="d19857697a6420b9df4abd1566845e1ae39dab98d39f638259e84970ef2cc0e9bffa3c134c7e104150a94d9d0ec7be965c7915254797ffb3caae20392bbc24c3000ac2", 0x43)
ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40605346, &(0x7f00000001c0)={0x0, 0x0, 0x3, 'queue0\x03\xe8\x00'})

03:26:26 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

03:26:26 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000919447f36ce89202d5b814d114f451e03847d2fe7c99f5182c827399b1b905da9bf5f7c6e004eff1ca99990be260793a815c0c1d7c493bcebd6766a73bf82ed782b4762d9c52002aa4c6d88bc7cf948faed09f8eab04f27e4e7140f0d1aa"])
socket$bt_rfcomm(0x1f, 0x0, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = syz_open_procfs(0xffffffffffffffff, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x1, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b")
r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2000, 0x0)
ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x0, 0x0, 0x10001, 0x9})
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x200, 0x0, 0x0, 0x10001})
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0)
r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0)
r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffffffffffefd, 0x1, &(0x7f0000000180), 0x10000000000000a2)
bpf$MAP_CREATE(0x2, 0x0, 0x0)
ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000240)={0x0, 0x1})
syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00')
sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x44, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x0)
sendfile(r1, r1, 0x0, 0x80000001)
ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0xff, 0x2, 0x6, 0xc841, 0x401, 0xf9})
ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000340))
write$P9_RLERROR(r2, &(0x7f00000003c0)={0x10, 0x7, 0x1, {0x7, 'TIPCv2\x00'}}, 0x10)
socket$tipc(0x1e, 0x5, 0x0)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")

03:26:27 executing program 3:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b")

[  254.951446] rtc_cmos 00:00: Alarms can be up to one day in the future
03:26:27 executing program 4:
r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x3c)
fcntl$setstatus(r0, 0x4, 0x800000000004bfa)

03:26:27 executing program 4:
r0 = open(&(0x7f0000000100)='./bus\x00', 0x20000000000b04, 0x0)
poll(&(0x7f0000000280)=[{r0}], 0x1, 0x121)
r1 = open(&(0x7f0000002000)='./bus\x00', 0x141046, 0x0)
ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="8a2858f05d57a02ad9b137f47d0700150031c990030d7f720789fa3afb6e70f9b68f53309b1a003177af1b7ededd9bfffb47697145fb5970574bfb00e96f773a3b11c403c19f3869930dc5a99f55ef7a1d9447c95289e21a4ba42e3fca737f0e754fa69c61151b821c7850be55cb9aa6c15feb6be9019309e3976f5591f51c7000004a048693c4a5f91b895715b9b005adc4c3176473c76a152fea92"])

[  255.120771] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  255.163436] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  255.190683] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  255.208303] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  255.219743]  loop0: p1[EZD]
[  255.223904] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  255.238910] loop0: p1 size 2047 extends beyond EOD, truncated
[  255.245262]  loop1: p1[EZD]
[  255.248775] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:27 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")

[  255.265499]  loop3: p1[EZD]
03:26:27 executing program 5:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='sbbj_User=],\x00'])
socket$bt_rfcomm(0x1f, 0x3, 0x3)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sysfs$1(0xffffff1f, 0x0)
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0)
setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x2, 0x6, 0x8, 0xae4e, 0x6, 0x80, 0x1}, 0x1c)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x3})

03:26:27 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00')
sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000d8833995a28f2dbb0000", @ANYRES16=r1, @ANYBLOB="03070000000000000000070000000c0002000600020000000000"], 0x20}}, 0x0)

[  255.407532] audit: type=1400 audit(1564716387.455:74): avc:  denied  { relabelto } for  pid=13987 comm="syz-executor.0" name="file0" dev="sda1" ino=17062 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modem_device_t:s0 tclass=lnk_file permissive=1
[  255.502174] audit: type=1804 audit(1564716387.545:75): pid=14032 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir183135729/syzkaller.Qe7nGF/169/bus" dev="sda1" ino=17061 res=1
03:26:27 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0)
pipe(0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x20000001, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0)
ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xfffffffffffffffc)
fallocate(r0, 0x40, 0x0, 0x7)
setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0)
sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
mkdir(&(0x7f0000000440)='./file1\x00', 0x0)
symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00')
mkdir(&(0x7f0000000340)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1'])
r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0/f.le.\x00')
renameat(r2, &(0x7f00000001c0)='.//ile0\x00', 0xffffffffffffffff, 0x0)

03:26:27 executing program 0:
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@subj_user={'subj_user', 0x3d, ']'}}]})
r0 = socket$bt_rfcomm(0x1f, 0x100000000000000, 0x3)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x400500)
getsockopt(r0, 0x7, 0x7f, &(0x7f0000000240)=""/136, &(0x7f0000000300)=0x449)
write$ppp(r1, &(0x7f00000000c0)="607d3f8f91333f46d8b263c80a0e7c5b5df760bfc240097783afb6bedf7ce5b2be75171b4750e8ec98cbe762069c8e37aa0f053a5742dfc8b0660307c9d4118be8237f3c8d5e11102fbe7e86260f421c1d4ab5441751315dc70cea9b8f74f58f4df2d68cb6803329945ad07b1583", 0x6e)
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8)
fchdir(r0)
recvfrom$packet(r1, &(0x7f0000000340)=""/105, 0x69, 0x40, &(0x7f0000000540)={0x11, 0xf7, r2, 0x1, 0x6, 0x6, @local}, 0x14)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x0, 0xbb}, 'port1\x00', 0x8, 0x80000, 0x9b, 0xfff, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x3, 0xe7e})

03:26:27 executing program 4:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000000c0)={0x3, 0xc, [0xdee5, 0x2, 0x81]})
time(&(0x7f0000000040))
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x20600)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
unshare(0x20000)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000001540)={0x0, 0x100000000, 0x0, 'queue0\x00', 0x7})
perf_event_open(0x0, 0x0, 0x0, r1, 0x0)
r3 = creat(&(0x7f0000000300)='./bus\x00', 0x1)
ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000540)="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")
ioctl$KDGKBMODE(r0, 0x4b44, 0x0)
sendmsg$sock(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000001600)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0xc0}, 0x4000014)
ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)={0x7, 0x1d2f, 0x6, 0x0, 0x9, 0xae6c})
mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000080), 0x4)
getsockname$ax25(r3, &(0x7f0000000340)={{0x3, @null}, [@rose, @rose, @remote, @default, @rose, @rose, @netrom, @bcast]}, &(0x7f0000000180)=0x48)

03:26:27 executing program 3:
r0 = socket$kcm(0x29, 0x5, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x20000000)
sendto$inet(r1, &(0x7f0000000080)="ffa334fee2d5f68975473022bac65f9451ab0ae486ea46643396c2faacf8deb10c5d9c900e2d788b0d9066627d65e12c8e3b6aa5c38473c86c1f2ccbf3d29c5676d229a4b811a1e246a940e8984a809388fa9b3b70cadec9442a04dbeece1d70eeaa02d9c7e5de86682c8db6af6c19a486ad8f81086e257f5a310cd4148ba82f7acf5629a9a0a0c022bfff6b246c9dbdfa37e47918a4383b60a12bec3618125778335bd754c7d148a11525f2195293aa6697a48f650499a12875f84d3eda5bd3aa57d44a0273e1dd3b62da5518ea8314328ad339b4e87f3c628914be2acc577c533b325075a85fdef7cf8b22f0bc6048f8d5d507b358fa27ea", 0xf9, 0x4000000, 0x0, 0x0)

[  255.617168] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
[  255.637100] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
[  255.643842]  loop1: p1[EZD]
[  255.658555] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting.
03:26:27 executing program 3:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in, @in=@local}, {0x0, 0xfffffffffffffffe}, {0x0, 0x4}}, {{@in6=@rand_addr="a7c2fbe3a6501515791a426a990b64ea"}, 0x0, @in=@remote}}, 0xe8)

[  255.696167] ldm_validate_privheads(): Cannot find PRIVHEAD 1.
03:26:27 executing program 1:
syz_open_dev$admmidi(0x0, 0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@nls={'nls', 0x3d, 'koi8-r'}}, {@nodecompose='nodecompose'}]})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}])
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b")

[  255.747423]  loop5: p1[EZD]
03:26:27 executing program 3:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
time(&(0x7f0000000040))
unshare(0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
unshare(0x20000)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000001540)={0x0, 0x100000000, 0x0, 'queue0\x00', 0x7})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0)
ioctl$KDGKBMODE(r2, 0x4b44, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, 0x0)
ustat(0x5, &(0x7f0000000500))
mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080), 0x4)
getsockname$ax25(r2, &(0x7f0000000340)={{0x3, @null}, [@rose, @rose, @remote, @default, @rose, @rose, @netrom, @bcast]}, &(0x7f0000000180)=0x48)

03:26:28 executing program 2:
r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x3, 0x2)
r1 = semget$private(0x0, 0x3, 0x2)
semctl$GETZCNT(r1, 0x3, 0xf, &(0x7f0000000080))
ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000000c0)={0x3, r0})
getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000100)=""/67, &(0x7f0000000180)=0x43)
ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000001c0)=0x1d78000000000000)
write$P9_RREADLINK(r0, &(0x7f0000000200)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10)
r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0xfffffffffffffffd)
r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$negate(0xd, r2, 0xffff, r3)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x81000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44040}, 0x24008084)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'veth1_to_hsr\x00', 0x1800})
write$rfkill(r0, &(0x7f0000000500)={0x6, 0x4, 0x0, 0x0, 0x1}, 0x8)
ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000540)=""/2)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000580)={0x895, 0x101, 0x8001})
ioctl$TCGETS(r0, 0x5401, &(0x7f00000005c0))
eventfd(0x7)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000600)="5752cadb6df9ed9180c85df9296b3f6c", 0x10)
ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0)
mknod(&(0x7f0000000640)='./file0\x00', 0x8000, 0x80000000)
clock_gettime(0x0, &(0x7f0000000680)={<r5=>0x0, <r6=>0x0})
clock_gettime(0x0, &(0x7f00000006c0)={<r7=>0x0, <r8=>0x0})
clock_gettime(0x0, &(0x7f0000000700)={<r9=>0x0, <r10=>0x0})
write$evdev(r0, &(0x7f0000000740)=[{{}, 0x11, 0x1000, 0x80000000}, {{r5, r6/1000+30000}, 0x0, 0x8e0000000000}, {{r7, r8/1000+30000}, 0x16, 0x8, 0x4}, {{r9, r10/1000+30000}, 0x13, 0x10000, 0x7}, {{0x0, 0x7530}, 0x16, 0x2, 0x100000001}, {{0x0, 0x7530}, 0x0, 0x2, 0x7}, {{0x0, 0x2710}, 0x17, 0x1f00000000000, 0xffffffffffffff7f}, {{0x77359400}, 0x15, 0x8000, 0x9}, {{0x77359400}, 0x12, 0x4, 0x8}, {{0x0, 0x7530}, 0x4, 0x1f, 0x100000000}], 0xf0)
write$FUSE_BMAP(r0, &(0x7f0000000840)={0x18, 0x0, 0x3, {0x7}}, 0x18)
init_module(&(0x7f0000000880)='.\x00', 0x2, &(0x7f00000008c0)='\x00')
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000900)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000940)=0x10)
ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000980)="0139b9a48dad1dfcd809c13e0b795af942df251c0457")

[  255.949490] overlayfs: filesystem on './file0' not supported as upperdir
03:26:28 executing program 2:
fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, <r0=>0x0})
r1 = syz_open_procfs(r0, 0x0)
getdents64(r1, 0x0, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x313, 0x3, 0x0, 0x0, 0x0, 0x3})
r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@empty, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8)
r3 = getgid()
fchown(r2, 0x0, r3)
r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0)
getsockopt$inet_pktinfo(r4, 0x0, 0x8, 0x0, &(0x7f0000000480))
pipe2(0x0, 0x800)
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0)
prctl$PR_GET_FP_MODE(0x2e)
write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={<r5=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xffffffffffff8001, @mcast2, 0x20}, {0xa, 0x4e24, 0x9, @remote}, r5, 0x1}}, 0x48)
r6 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x77})
ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback})
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080))
accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240))
ftruncate(0xffffffffffffffff, 0x2000000000a48204)
r7 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0)
lchown(&(0x7f0000000180)='./bus\x00', 0x0, 0x0)
pread64(r7, 0x0, 0x0, 0x0)
getpeername$netlink(r1, 0x0, 0x0)
ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f00000005c0)={"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"})

03:26:28 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
fallocate(r1, 0x0, 0x0, 0x4003fd)
write$binfmt_elf64(r1, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be)
fallocate(r1, 0x1, 0x8000, 0x5a1)
fallocate(r1, 0x3, 0x5e89, 0xfff9)
setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x7, 0x4)

[  428.001994] INFO: task syz-executor.5:14048 blocked for more than 140 seconds.
[  428.009698]       Not tainted 4.14.135 #31
[  428.016579] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.024878] syz-executor.5  D27040 14048   7125 0x00000004
[  428.032882] Call Trace:
[  428.035485]  __schedule+0x7b8/0x1cd0
[  428.039195]  ? __mutex_lock+0x737/0x1470
[  428.043677]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.048854]  schedule+0x92/0x1c0
[  428.054642]  schedule_preempt_disabled+0x13/0x20
[  428.059647]  __mutex_lock+0x73c/0x1470
[  428.064098]  ? lo_release+0x20/0x1b0
[  428.075401]  ? mutex_trylock+0x1c0/0x1c0
[  428.079612]  ? blkdev_put+0x7b/0x510
[  428.083619]  ? blkdev_put+0x7b/0x510
[  428.087469]  ? loop_clr_fd+0xae0/0xae0
[  428.091948]  mutex_lock_nested+0x16/0x20
[  428.096170]  ? mutex_lock_nested+0x16/0x20
[  428.100507]  lo_release+0x20/0x1b0
[  428.104209]  ? loop_clr_fd+0xae0/0xae0
[  428.108763]  __blkdev_put+0x434/0x7f0
[  428.112790]  ? bd_set_size+0xb0/0xb0
[  428.116518]  ? wait_for_completion+0x420/0x420
[  428.121184]  blkdev_put+0x88/0x510
[  428.124720]  ? fcntl_setlk+0xb90/0xb90
[  428.128602]  ? blkdev_put+0x510/0x510
[  428.132448]  blkdev_close+0x8b/0xb0
[  428.136228]  __fput+0x275/0x7a0
[  428.139705]  ____fput+0x16/0x20
[  428.143088]  task_work_run+0x114/0x190
[  428.147142]  exit_to_usermode_loop+0x1da/0x220
[  428.152127]  do_syscall_64+0x4bc/0x640
[  428.156197]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  428.161401]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  428.166857] RIP: 0033:0x413511
[  428.170353] RSP: 002b:00007f498c757a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  428.178253] RAX: 0000000000000000 RBX: 00007f498c757b40 RCX: 0000000000413511
[  428.186182] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000004
[  428.193487] RBP: 0000000000000000 R08: 00007f498c757b40 R09: 00007f498c757ae0
[  428.201418] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
[  428.208982] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 00000000ffffffff
[  428.216671] INFO: task syz-executor.4:14081 blocked for more than 140 seconds.
[  428.224902]       Not tainted 4.14.135 #31
[  428.229424] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.237675] syz-executor.4  D28832 14081   6883 0x00000004
[  428.243746] Call Trace:
[  428.246669]  __schedule+0x7b8/0x1cd0
[  428.250765]  ? __mutex_lock+0x737/0x1470
[  428.255441]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.260859]  schedule+0x92/0x1c0
[  428.264225]  schedule_preempt_disabled+0x13/0x20
[  428.269272]  __mutex_lock+0x73c/0x1470
[  428.273420]  ? loop_control_ioctl+0x153/0x2f0
[  428.278202]  ? mutex_trylock+0x1c0/0x1c0
[  428.282506]  ? retint_kernel+0x2d/0x2d
[  428.286401]  ? trace_hardirqs_on_caller+0x400/0x590
[  428.291486]  ? __radix_tree_lookup+0x1b3/0x2f0
[  428.296089]  mutex_lock_nested+0x16/0x20
[  428.300618]  ? mutex_lock_nested+0x16/0x20
[  428.305262]  loop_control_ioctl+0x153/0x2f0
[  428.309937]  ? loop_add+0x850/0x850
[  428.313648]  ? loop_add+0x850/0x850
[  428.317398]  do_vfs_ioctl+0x7ae/0x1060
[  428.321371]  ? selinux_file_mprotect+0x5d0/0x5d0
[  428.326133]  ? lock_downgrade+0x6e0/0x6e0
[  428.330332]  ? ioctl_preallocate+0x1c0/0x1c0
[  428.334925]  ? __fget+0x237/0x370
[  428.338395]  ? security_file_ioctl+0x89/0xb0
[  428.343147]  SyS_ioctl+0x8f/0xc0
[  428.346910]  ? do_vfs_ioctl+0x1060/0x1060
[  428.351695]  do_syscall_64+0x1e8/0x640
[  428.355729]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  428.361036]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  428.366221] RIP: 0033:0x459829
[  428.369718] RSP: 002b:00007f71dc28ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  428.377750] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829
[  428.385067] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000004
[  428.392422] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
[  428.399788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f71dc28f6d4
[  428.407609] R13: 00000000004c2f72 R14: 00000000004d65b8 R15: 00000000ffffffff
[  428.415250] INFO: task syz-executor.0:14075 blocked for more than 140 seconds.
[  428.423061]       Not tainted 4.14.135 #31
[  428.427473] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.435839] syz-executor.0  D29184 14075   8063 0x00000004
[  428.441538] Call Trace:
[  428.444132]  __schedule+0x7b8/0x1cd0
[  428.447836]  ? __mutex_lock+0x737/0x1470
[  428.452316]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.457515]  schedule+0x92/0x1c0
[  428.460971]  schedule_preempt_disabled+0x13/0x20
[  428.465887]  __mutex_lock+0x73c/0x1470
[  428.470232]  ? __mutex_unlock_slowpath+0x71/0x800
[  428.475082]  ? __blkdev_get+0x145/0x1120
[  428.479359]  ? mutex_trylock+0x1c0/0x1c0
[  428.484162]  ? exact_match+0xd/0x20
[  428.488157]  ? kobj_lookup+0x314/0x400
[  428.492270]  ? blkdev_ioctl+0x1860/0x1860
[  428.496540]  mutex_lock_nested+0x16/0x20
[  428.500691]  ? mutex_lock_nested+0x16/0x20
[  428.505136]  __blkdev_get+0x145/0x1120
[  428.509040]  ? __blkdev_put+0x7f0/0x7f0
[  428.513091]  ? bd_acquire+0x178/0x2c0
[  428.517047]  ? find_held_lock+0x35/0x130
[  428.521424]  blkdev_get+0xa8/0x8e0
[  428.525306]  ? bd_may_claim+0xd0/0xd0
[  428.529107]  ? _raw_spin_unlock+0x2d/0x50
[  428.533362]  blkdev_open+0x1d1/0x260
[  428.537483]  ? security_file_open+0x89/0x190
[  428.542156]  do_dentry_open+0x73b/0xeb0
[  428.546134]  ? bd_acquire+0x2c0/0x2c0
[  428.550543]  vfs_open+0x105/0x220
[  428.554167]  path_openat+0x8bd/0x3f70
[  428.557977]  ? trace_hardirqs_on+0x10/0x10
[  428.562700]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  428.567553]  ? find_held_lock+0x35/0x130
[  428.571986]  ? __alloc_fd+0x1d4/0x4a0
[  428.575795]  do_filp_open+0x18e/0x250
[  428.579801]  ? may_open_dev+0xe0/0xe0
[  428.583813]  ? _raw_spin_unlock+0x2d/0x50
[  428.588076]  ? __alloc_fd+0x1d4/0x4a0
[  428.592117]  do_sys_open+0x2c5/0x430
[  428.595920]  ? filp_open+0x70/0x70
[  428.599724]  ? do_sys_ftruncate.constprop.0+0x370/0x490
[  428.605339]  SyS_open+0x2d/0x40
[  428.608631]  ? do_sys_open+0x430/0x430
[  428.612964]  do_syscall_64+0x1e8/0x640
[  428.616848]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  428.622054]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  428.627526] RIP: 0033:0x413711
[  428.630810] RSP: 002b:00007f86267efa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
[  428.639417] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711
[  428.647550] RDX: 00007f86267efb0a RSI: 0000000000000002 RDI: 00007f86267efb00
[  428.655689] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a
[  428.663407] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003
[  428.671224] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 00000000ffffffff
[  428.678610] INFO: task syz-executor.0:14079 blocked for more than 140 seconds.
[  428.686579]       Not tainted 4.14.135 #31
[  428.690973] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.699464] syz-executor.0  D29032 14079   8063 0x00000004
[  428.705347] Call Trace:
[  428.707980]  __schedule+0x7b8/0x1cd0
[  428.711915]  ? __mutex_lock+0x737/0x1470
[  428.716177]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.721403]  schedule+0x92/0x1c0
[  428.724926]  schedule_preempt_disabled+0x13/0x20
[  428.729672]  __mutex_lock+0x73c/0x1470
[  428.733776]  ? blkdev_reread_part+0x1f/0x40
[  428.738524]  ? mutex_trylock+0x1c0/0x1c0
[  428.743387]  ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[  428.748499]  ? __wake_up_common_lock+0xe3/0x160
[  428.753550]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  428.759238]  mutex_lock_nested+0x16/0x20
[  428.763871]  ? mutex_lock_nested+0x16/0x20
[  428.768110]  blkdev_reread_part+0x1f/0x40
[  428.772407]  loop_reread_partitions+0x7c/0x90
[  428.777326]  loop_set_status+0xc25/0x11f0
[  428.781708]  loop_set_status64+0xa6/0xf0
[  428.785770]  ? loop_set_status_old+0x2d0/0x2d0
[  428.790861]  ? avc_ss_reset+0x110/0x110
[  428.794844]  lo_ioctl+0x5c1/0x1ce0
[  428.798646]  ? loop_probe+0x160/0x160
[  428.802911]  blkdev_ioctl+0x96b/0x1860
[  428.806987]  ? blkpg_ioctl+0x980/0x980
[  428.811260]  ? __might_sleep+0x93/0xb0
[  428.815730]  ? __fget+0x210/0x370
[  428.819182]  block_ioctl+0xde/0x120
[  428.822907]  ? blkdev_fallocate+0x3b0/0x3b0
[  428.827228]  do_vfs_ioctl+0x7ae/0x1060
[  428.831167]  ? selinux_file_mprotect+0x5d0/0x5d0
[  428.836141]  ? lock_downgrade+0x6e0/0x6e0
[  428.840571]  ? ioctl_preallocate+0x1c0/0x1c0
[  428.845313]  ? __fget+0x237/0x370
[  428.848775]  ? security_file_ioctl+0x89/0xb0
[  428.853279]  SyS_ioctl+0x8f/0xc0
[  428.856733]  ? do_vfs_ioctl+0x1060/0x1060
[  428.861473]  do_syscall_64+0x1e8/0x640
[  428.865373]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  428.870698]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  428.876059] RIP: 0033:0x459697
[  428.879243] RSP: 002b:00007f86267ce9f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010
[  428.887256] RAX: ffffffffffffffda RBX: 00007f86267cf6d4 RCX: 0000000000459697
[  428.894564] RDX: 00007f86267ceab0 RSI: 0000000000004c04 RDI: 0000000000000003
[  428.902360] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a
[  428.909880] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000006
[  428.917628] R13: 0000000000000006 R14: 0000000000000003 R15: 00000000ffffffff
[  428.925162] INFO: task syz-executor.1:14086 blocked for more than 140 seconds.
[  428.932925]       Not tainted 4.14.135 #31
[  428.937191] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.945263] syz-executor.1  D28592 14086   6884 0x00000004
[  428.951019] Call Trace:
[  428.953616]  __schedule+0x7b8/0x1cd0
[  428.957546]  ? __mutex_lock+0x737/0x1470
[  428.961796]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.967101]  schedule+0x92/0x1c0
[  428.970696]  schedule_preempt_disabled+0x13/0x20
[  428.975456]  __mutex_lock+0x73c/0x1470
[  428.979914]  ? __mutex_unlock_slowpath+0x71/0x800
[  428.984994]  ? __blkdev_get+0x145/0x1120
[  428.989055]  ? mutex_trylock+0x1c0/0x1c0
[  428.993159]  ? exact_match+0xd/0x20
[  428.997136]  ? kobj_lookup+0x314/0x400
[  429.001521]  ? blkdev_ioctl+0x1860/0x1860
[  429.005741]  mutex_lock_nested+0x16/0x20
[  429.009889]  ? mutex_lock_nested+0x16/0x20
[  429.014176]  __blkdev_get+0x145/0x1120
[  429.018062]  ? __blkdev_put+0x7f0/0x7f0
[  429.022307]  ? bd_acquire+0x178/0x2c0
[  429.026929]  ? find_held_lock+0x35/0x130
[  429.031198]  blkdev_get+0xa8/0x8e0
[  429.034781]  ? bd_may_claim+0xd0/0xd0
[  429.038592]  ? _raw_spin_unlock+0x2d/0x50
[  429.043286]  blkdev_open+0x1d1/0x260
[  429.047582]  ? security_file_open+0x89/0x190
[  429.052082]  do_dentry_open+0x73b/0xeb0
[  429.056056]  ? bd_acquire+0x2c0/0x2c0
[  429.059854]  vfs_open+0x105/0x220
[  429.063385]  path_openat+0x8bd/0x3f70
[  429.067321]  ? trace_hardirqs_on+0x10/0x10
[  429.071662]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  429.076580]  ? find_held_lock+0x35/0x130
[  429.081204]  ? __alloc_fd+0x1d4/0x4a0
[  429.085162]  do_filp_open+0x18e/0x250
[  429.088964]  ? may_open_dev+0xe0/0xe0
[  429.092857]  ? _raw_spin_unlock+0x2d/0x50
[  429.097004]  ? __alloc_fd+0x1d4/0x4a0
[  429.100884]  do_sys_open+0x2c5/0x430
[  429.104759]  ? filp_open+0x70/0x70
[  429.108287]  ? fput+0xd4/0x150
[  429.111591]  ? SyS_pwrite64+0xca/0x140
[  429.115477]  SyS_open+0x2d/0x40
[  429.118744]  ? do_sys_open+0x430/0x430
[  429.122704]  do_syscall_64+0x1e8/0x640
[  429.126923]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.132721]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.138163] RIP: 0033:0x413711
[  429.141588] RSP: 002b:00007f5f7ecfd9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
[  429.150917] RAX: ffffffffffffffda RBX: 00007f5f7ecfe6d4 RCX: 0000000000413711
[  429.158377] RDX: 00007f5f7ecfdbaa RSI: 0000000000000002 RDI: 00007f5f7ecfdba0
[  429.165747] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a
[  429.173775] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006
[  429.181389] R13: 0000000000000006 R14: 00007f5f7ecfe6d4 R15: 00000000ffffffff
[  429.188928] INFO: task syz-executor.1:14094 blocked for more than 140 seconds.
[  429.196379]       Not tainted 4.14.135 #31
[  429.200827] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  429.209143] syz-executor.1  D29152 14094   6884 0x00000004
[  429.215080] Call Trace:
[  429.217994]  __schedule+0x7b8/0x1cd0
[  429.221891]  ? __mutex_lock+0x737/0x1470
[  429.226321]  ? pci_mmcfg_check_reserved+0x150/0x150
[  429.231533]  schedule+0x92/0x1c0
[  429.234989]  schedule_preempt_disabled+0x13/0x20
[  429.239740]  __mutex_lock+0x73c/0x1470
[  429.243976]  ? trace_hardirqs_on+0x10/0x10
[  429.248408]  ? lo_open+0x1d/0xb0
[  429.251853]  ? refcount_inc_not_zero+0x80/0xe0
[  429.256943]  ? mutex_trylock+0x1c0/0x1c0
[  429.261881]  ? find_held_lock+0x35/0x130
[  429.265946]  ? disk_get_part+0x9c/0x140
[  429.270190]  ? lock_downgrade+0x6e0/0x6e0
[  429.274500]  ? loop_unregister_transfer+0x90/0x90
[  429.279551]  mutex_lock_nested+0x16/0x20
[  429.285016]  ? mutex_lock_nested+0x16/0x20
[  429.289410]  lo_open+0x1d/0xb0
[  429.292667]  __blkdev_get+0x2c7/0x1120
[  429.296552]  ? __blkdev_put+0x7f0/0x7f0
[  429.300755]  ? bd_acquire+0x178/0x2c0
[  429.304554]  ? find_held_lock+0x35/0x130
[  429.309032]  blkdev_get+0xa8/0x8e0
[  429.312838]  ? bd_may_claim+0xd0/0xd0
[  429.316643]  ? _raw_spin_unlock+0x2d/0x50
[  429.320862]  blkdev_open+0x1d1/0x260
[  429.324769]  ? security_file_open+0x89/0x190
[  429.329183]  do_dentry_open+0x73b/0xeb0
[  429.333224]  ? bd_acquire+0x2c0/0x2c0
[  429.337021]  vfs_open+0x105/0x220
[  429.340719]  path_openat+0x8bd/0x3f70
[  429.344529]  ? trace_hardirqs_on+0x10/0x10
[  429.348893]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  429.353642]  ? find_held_lock+0x35/0x130
[  429.357706]  ? __alloc_fd+0x1d4/0x4a0
[  429.361620]  do_filp_open+0x18e/0x250
[  429.365517]  ? may_open_dev+0xe0/0xe0
[  429.369322]  ? _raw_spin_unlock+0x2d/0x50
[  429.373740]  ? __alloc_fd+0x1d4/0x4a0
[  429.377555]  do_sys_open+0x2c5/0x430
[  429.381354]  ? filp_open+0x70/0x70
[  429.384895]  ? do_sys_ftruncate.constprop.0+0x370/0x490
[  429.390926]  SyS_open+0x2d/0x40
[  429.394207]  ? do_sys_open+0x430/0x430
[  429.398274]  do_syscall_64+0x1e8/0x640
[  429.402272]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.407266]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.412529] RIP: 0033:0x413711
[  429.415713] RSP: 002b:00007f5f7ecdca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
[  429.423494] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711
[  429.431469] RDX: 00007f5f7ecdcb0a RSI: 0000000000000002 RDI: 00007f5f7ecdcb00
[  429.438743] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a
[  429.446289] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003
[  429.453936] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 00000000ffffffff
[  429.461791] INFO: task blkid:14084 blocked for more than 140 seconds.
[  429.468371]       Not tainted 4.14.135 #31
[  429.472904] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  429.481089] blkid           D28512 14084   8093 0x00000004
[  429.486911] Call Trace:
[  429.489699]  __schedule+0x7b8/0x1cd0
[  429.493652]  ? __mutex_lock+0x737/0x1470
[  429.497719]  ? pci_mmcfg_check_reserved+0x150/0x150
[  429.502954]  schedule+0x92/0x1c0
[  429.506321]  schedule_preempt_disabled+0x13/0x20
[  429.511130]  __mutex_lock+0x73c/0x1470
[  429.515150]  ? blkdev_put+0x2b/0x510
[  429.519048]  ? mutex_trylock+0x1c0/0x1c0
[  429.523722]  ? fsnotify+0x92f/0x11e0
[  429.527444]  ? blkdev_put+0x510/0x510
[  429.531288]  mutex_lock_nested+0x16/0x20
[  429.535568]  ? mutex_lock_nested+0x16/0x20
[  429.540271]  blkdev_put+0x2b/0x510
[  429.544104]  ? fcntl_setlk+0xb90/0xb90
[  429.547987]  ? blkdev_put+0x510/0x510
[  429.552199]  blkdev_close+0x8b/0xb0
[  429.555910]  __fput+0x275/0x7a0
[  429.559288]  ____fput+0x16/0x20
[  429.562833]  task_work_run+0x114/0x190
[  429.566952]  exit_to_usermode_loop+0x1da/0x220
[  429.571719]  do_syscall_64+0x4bc/0x640
[  429.575608]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.580518]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.585862] RIP: 0033:0x7fe9377682b0
[  429.589715] RSP: 002b:00007ffe92792288 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  429.597505] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fe9377682b0
[  429.604983] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
[  429.612395] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
[  429.620268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001c8c030
[  429.627791] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005
[  429.635367] INFO: task blkid:14085 blocked for more than 140 seconds.
[  429.641984]       Not tainted 4.14.135 #31
[  429.646474] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  429.655043] blkid           D29040 14085   7387 0x00000004
[  429.660711] Call Trace:
[  429.663297]  __schedule+0x7b8/0x1cd0
[  429.667370]  ? __mutex_lock+0x737/0x1470
[  429.671512]  ? pci_mmcfg_check_reserved+0x150/0x150
[  429.676628]  schedule+0x92/0x1c0
[  429.679990]  schedule_preempt_disabled+0x13/0x20
[  429.684983]  __mutex_lock+0x73c/0x1470
[  429.689107]  ? lo_open+0x1d/0xb0
[  429.692541]  ? refcount_inc_not_zero+0x80/0xe0
[  429.697536]  ? mutex_trylock+0x1c0/0x1c0
[  429.701687]  ? exact_match+0xd/0x20
[  429.705474]  ? kobj_lookup+0x314/0x400
[  429.709362]  ? loop_unregister_transfer+0x90/0x90
[  429.714481]  mutex_lock_nested+0x16/0x20
[  429.718674]  ? mutex_lock_nested+0x16/0x20
[  429.723133]  lo_open+0x1d/0xb0
[  429.726413]  __blkdev_get+0xaad/0x1120
[  429.730549]  ? __blkdev_put+0x7f0/0x7f0
[  429.734618]  ? bd_acquire+0x178/0x2c0
[  429.738521]  ? find_held_lock+0x35/0x130
[  429.742673]  blkdev_get+0xa8/0x8e0
[  429.746401]  ? bd_may_claim+0xd0/0xd0
[  429.750447]  ? _raw_spin_unlock+0x2d/0x50
[  429.754760]  blkdev_open+0x1d1/0x260
[  429.758474]  ? security_file_open+0x89/0x190
[  429.763165]  do_dentry_open+0x73b/0xeb0
[  429.767387]  ? bd_acquire+0x2c0/0x2c0
[  429.771306]  vfs_open+0x105/0x220
[  429.774760]  path_openat+0x8bd/0x3f70
[  429.778557]  ? trace_hardirqs_on+0x10/0x10
[  429.783238]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  429.787920]  ? find_held_lock+0x35/0x130
[  429.792054]  ? __alloc_fd+0x1d4/0x4a0
[  429.795993]  do_filp_open+0x18e/0x250
[  429.799810]  ? may_open_dev+0xe0/0xe0
[  429.803711]  ? _raw_spin_unlock+0x2d/0x50
[  429.807867]  ? __alloc_fd+0x1d4/0x4a0
[  429.811887]  do_sys_open+0x2c5/0x430
[  429.815701]  ? filp_open+0x70/0x70
[  429.819252]  SyS_open+0x2d/0x40
[  429.822606]  ? do_sys_open+0x430/0x430
[  429.826608]  do_syscall_64+0x1e8/0x640
[  429.830581]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.835442]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.840729] RIP: 0033:0x7f7e7a7fa120
[  429.844439] RSP: 002b:00007ffc2e6400d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  429.852529] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7e7a7fa120
[  429.860106] RDX: 00007ffc2e640f41 RSI: 0000000000000000 RDI: 00007ffc2e640f41
[  429.867687] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000
[  429.875283] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000239c030
[  429.882687] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005
[  429.889967] INFO: task syz-executor.3:14091 blocked for more than 140 seconds.
[  429.897816]       Not tainted 4.14.135 #31
[  429.902267] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  429.910705] syz-executor.3  D29696 14091   6882 0x00000004
[  429.916344] Call Trace:
[  429.919178]  __schedule+0x7b8/0x1cd0
[  429.923092]  ? __mutex_lock+0x737/0x1470
[  429.927336]  ? pci_mmcfg_check_reserved+0x150/0x150
[  429.932425]  schedule+0x92/0x1c0
[  429.935789]  schedule_preempt_disabled+0x13/0x20
[  429.940947]  __mutex_lock+0x73c/0x1470
[  429.944976]  ? loop_control_ioctl+0x65/0x2f0
[  429.949788]  ? mutex_trylock+0x1c0/0x1c0
[  429.953943]  ? trace_hardirqs_on+0x10/0x10
[  429.958274]  ? __might_fault+0x110/0x1d0
[  429.962615]  mutex_lock_nested+0x16/0x20
[  429.967041]  ? mutex_lock_nested+0x16/0x20
[  429.971388]  loop_control_ioctl+0x65/0x2f0
[  429.975626]  ? loop_add+0x850/0x850
[  429.979254]  ? loop_add+0x850/0x850
[  429.982944]  do_vfs_ioctl+0x7ae/0x1060
[  429.986828]  ? selinux_file_mprotect+0x5d0/0x5d0
[  429.991857]  ? lock_downgrade+0x6e0/0x6e0
[  429.996373]  ? ioctl_preallocate+0x1c0/0x1c0
[  430.001044]  ? __fget+0x237/0x370
[  430.004637]  ? security_file_ioctl+0x89/0xb0
[  430.009211]  SyS_ioctl+0x8f/0xc0
[  430.012652]  ? do_vfs_ioctl+0x1060/0x1060
[  430.016798]  do_syscall_64+0x1e8/0x640
[  430.020914]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  430.025893]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  430.031153] RIP: 0033:0x459829
[  430.034338] RSP: 002b:00007f560fa3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  430.042582] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829
[  430.049846] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005
[  430.057350] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  430.072261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa3f6d4
[  430.079698] R13: 00000000004c2f47 R14: 00000000004d6588 R15: 00000000ffffffff
[  430.087126] INFO: task syz-executor.3:14099 blocked for more than 140 seconds.
[  430.095146]       Not tainted 4.14.135 #31
[  430.099661] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  430.108370] syz-executor.3  D30176 14099   6882 0x00000004
[  430.114058] Call Trace:
[  430.116990]  __schedule+0x7b8/0x1cd0
[  430.120796]  ? __mutex_lock+0x737/0x1470
[  430.124987]  ? pci_mmcfg_check_reserved+0x150/0x150
[  430.130324]  schedule+0x92/0x1c0
[  430.133690]  schedule_preempt_disabled+0x13/0x20
[  430.138647]  __mutex_lock+0x73c/0x1470
[  430.142696]  ? loop_control_ioctl+0x65/0x2f0
[  430.147340]  ? mutex_trylock+0x1c0/0x1c0
[  430.151578]  ? trace_hardirqs_on+0x10/0x10
[  430.155934]  ? __might_fault+0x110/0x1d0
[  430.160368]  mutex_lock_nested+0x16/0x20
[  430.164427]  ? mutex_lock_nested+0x16/0x20
[  430.169015]  loop_control_ioctl+0x65/0x2f0
[  430.173973]  ? loop_add+0x850/0x850
[  430.177595]  ? loop_add+0x850/0x850
[  430.181596]  do_vfs_ioctl+0x7ae/0x1060
[  430.185487]  ? selinux_file_mprotect+0x5d0/0x5d0
[  430.190675]  ? lock_downgrade+0x6e0/0x6e0
[  430.194835]  ? ioctl_preallocate+0x1c0/0x1c0
[  430.199241]  ? __fget+0x237/0x370
[  430.202773]  ? security_file_ioctl+0x89/0xb0
[  430.207621]  SyS_ioctl+0x8f/0xc0
[  430.211098]  ? do_vfs_ioctl+0x1060/0x1060
[  430.215252]  do_syscall_64+0x1e8/0x640
[  430.219137]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  430.224187]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  430.229884] RIP: 0033:0x459829
[  430.233163] RSP: 002b:00007f560fa1dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  430.241099] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829
[  430.248554] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000005
[  430.256173] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
[  430.263580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f560fa1e6d4
[  430.271427] R13: 00000000004c2f72 R14: 00000000004d65b8 R15: 00000000ffffffff
[  430.279034] 
[  430.279034] Showing all locks held in the system:
[  430.285777] 1 lock held by khungtaskd/1012:
[  430.290541]  #0:  (tasklist_lock){.+.+}, at: [<ffffffff81484f38>] debug_show_all_locks+0x7f/0x21f
[  430.299923] 1 lock held by rsyslogd/6709:
[  430.304177]  #0:  (&f->f_pos_lock){+.+.}, at: [<ffffffff819413ab>] __fdget_pos+0xab/0xd0
[  430.313316] 2 locks held by getty/6831:
[  430.317519]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861bc3d3>] ldsem_down_read+0x33/0x40
[  430.326434]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310cee6>] n_tty_read+0x1e6/0x17b0
[  430.336176] 2 locks held by getty/6832:
[  430.340371]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861bc3d3>] ldsem_down_read+0x33/0x40
[  430.349550]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310cee6>] n_tty_read+0x1e6/0x17b0
[  430.359316] 2 locks held by getty/6833:
[  430.363441]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861bc3d3>] ldsem_down_read+0x33/0x40
[  430.372507]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310cee6>] n_tty_read+0x1e6/0x17b0
[  430.382298] 2 locks held by getty/6834:
[  430.386264]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861bc3d3>] ldsem_down_read+0x33/0x40
[  430.395259]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310cee6>] n_tty_read+0x1e6/0x17b0
[  430.405020] 2 locks held by getty/6835:
[  430.409488]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861bc3d3>] ldsem_down_read+0x33/0x40
[  430.418281]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310cee6>] n_tty_read+0x1e6/0x17b0
[  430.428084] 2 locks held by getty/6836:
[  430.432303]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861bc3d3>] ldsem_down_read+0x33/0x40
[  430.441410]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310cee6>] n_tty_read+0x1e6/0x17b0
[  430.451148] 2 locks held by getty/6837:
[  430.455266]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861bc3d3>] ldsem_down_read+0x33/0x40
[  430.464300]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310cee6>] n_tty_read+0x1e6/0x17b0
[  430.473881] 2 locks held by syz-executor.5/14048:
[  430.478717]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a5f16>] __blkdev_put+0xa6/0x7f0
[  430.487904]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff83735530>] lo_release+0x20/0x1b0
[  430.496643] 2 locks held by syz-executor.4/14081:
[  430.501534]  #0:  (loop_index_mutex){+.+.}, at: [<ffffffff83736d45>] loop_control_ioctl+0x65/0x2f0
[  430.511211]  #1:  (&lo->lo_ctl_mutex#2){+.+.}, at: [<ffffffff83736e33>] loop_control_ioctl+0x153/0x2f0
[  430.520744] 1 lock held by syz-executor.0/14075:
[  430.525596]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a67a5>] __blkdev_get+0x145/0x1120
[  430.534513] 2 locks held by syz-executor.0/14079:
[  430.539352]  #0:  (&lo->lo_ctl_mutex/1){+.+.}, at: [<ffffffff837371bf>] lo_ioctl+0x8f/0x1ce0
[  430.548499]  #1:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff82cab9ff>] blkdev_reread_part+0x1f/0x40
[  430.557701] 1 lock held by syz-executor.1/14086:
[  430.562782]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a67a5>] __blkdev_get+0x145/0x1120
[  430.571788] 2 locks held by syz-executor.1/14094:
[  430.576629]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a67a5>] __blkdev_get+0x145/0x1120
[  430.585818]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff8373096d>] lo_open+0x1d/0xb0
[  430.594283] 1 lock held by blkid/14084:
[  430.598270]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a77ab>] blkdev_put+0x2b/0x510
[  430.606853] 2 locks held by blkid/14085:
[  430.610942]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a67a5>] __blkdev_get+0x145/0x1120
[  430.619735]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff8373096d>] lo_open+0x1d/0xb0
[  430.627849] 1 lock held by syz-executor.3/14091:
[  430.632622]  #0:  (loop_index_mutex){+.+.}, at: [<ffffffff83736d45>] loop_control_ioctl+0x65/0x2f0
[  430.641793] 1 lock held by syz-executor.3/14099:
[  430.646544]  #0:  (loop_index_mutex){+.+.}, at: [<ffffffff83736d45>] loop_control_ioctl+0x65/0x2f0
[  430.655811] 1 lock held by syz-executor.3/14102:
[  430.660741]  #0:  (loop_index_mutex){+.+.}, at: [<ffffffff83736d45>] loop_control_ioctl+0x65/0x2f0
[  430.670065] 1 lock held by syz-executor.3/14116:
[  430.674911]  #0:  (loop_index_mutex){+.+.}, at: [<ffffffff83736d45>] loop_control_ioctl+0x65/0x2f0
[  430.684379] 1 lock held by blkid/14097:
[  430.688355]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a67a5>] __blkdev_get+0x145/0x1120
[  430.697225] 
[  430.698860] =============================================
[  430.698860] 
[  430.706572] NMI backtrace for cpu 1
[  430.710254] CPU: 1 PID: 1012 Comm: khungtaskd Not tainted 4.14.135 #31
[  430.716923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  430.726555] Call Trace:
[  430.729154]  dump_stack+0x138/0x19c
[  430.732803]  nmi_cpu_backtrace.cold+0x57/0x94
[  430.737609]  ? irq_force_complete_move.cold+0x7d/0x7d
[  430.742811]  nmi_trigger_cpumask_backtrace+0x141/0x189
[  430.748102]  arch_trigger_cpumask_backtrace+0x14/0x20
[  430.753308]  watchdog+0x5e7/0xb90
[  430.756776]  kthread+0x319/0x430
[  430.760283]  ? hungtask_pm_notify+0x50/0x50
[  430.764614]  ? kthread_create_on_node+0xd0/0xd0
[  430.769293]  ret_from_fork+0x24/0x30
[  430.773103] Sending NMI from CPU 1 to CPUs 0:
[  430.777831] NMI backtrace for cpu 0
[  430.777834] CPU: 0 PID: 6871 Comm: syz-fuzzer Not tainted 4.14.135 #31
[  430.777838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  430.777840] task: ffff8880a62e2000 task.stack: ffff8880a4cd0000
[  430.777842] RIP: 0033:0x41d493
[  430.777844] RSP: 002b:000000c420357e90 EFLAGS: 00000293
[  430.777848] RAX: 000000c420000000 RBX: 000000c41fcc1bff RCX: 0000000000000000
[  430.777851] RDX: 000000c43c280000 RSI: 000000c4267c8000 RDI: 0000000000000000
[  430.777854] RBP: 000000c420357f28 R08: 0000000000000000 R09: 000000000107b3c0
[  430.777856] R10: 0000000000000040 R11: 000000c4259bde60 R12: 000000c42779a800
[  430.777859] R13: 0000000000000079 R14: 0000000000000000 R15: 0000000000000000
[  430.777861] FS:  000000c4202b5890(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000
[  430.777864] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  430.777866] CR2: 000000c436751010 CR3: 00000000832c8000 CR4: 00000000001406f0
[  430.777869] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  430.777871] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  430.779207] Kernel panic - not syncing: hung_task: blocked tasks
[  430.891784] CPU: 1 PID: 1012 Comm: khungtaskd Not tainted 4.14.135 #31
[  430.898623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  430.907985] Call Trace:
[  430.910589]  dump_stack+0x138/0x19c
[  430.914225]  panic+0x1f2/0x426
[  430.917586]  ? add_taint.cold+0x16/0x16
[  430.921567]  ? ___preempt_schedule+0x16/0x18
[  430.926079]  watchdog+0x5f8/0xb90
[  430.929719]  kthread+0x319/0x430
[  430.933092]  ? hungtask_pm_notify+0x50/0x50
[  430.937579]  ? kthread_create_on_node+0xd0/0xd0
[  430.942395]  ret_from_fork+0x24/0x30
[  430.947797] Kernel Offset: disabled
[  430.951454] Rebooting in 86400 seconds..