pt(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2936.460711] net_ratelimit: 22 callbacks suppressed [ 2936.460720] protocol 88fb is buggy, dev hsr_slave_0 [ 2936.470790] protocol 88fb is buggy, dev hsr_slave_1 01:03:39 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:39 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba60d8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:39 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2936.581861] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:03:39 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2936.627489] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:39 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2936.756286] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:03:39 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2936.855203] Dev loop0: unable to read RDB block 1 [ 2936.884709] loop0: unable to read partition table 01:03:39 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', 0x0, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2936.908597] loop0: partition table beyond EOD, truncated 01:03:40 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', 0x0, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:40 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:40 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2936.965984] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2937.073678] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:40 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2937.154481] Dev loop0: unable to read RDB block 1 [ 2937.159388] loop0: unable to read partition table [ 2937.229146] loop0: partition table beyond EOD, truncated [ 2937.251755] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2937.260678] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.265774] protocol 88fb is buggy, dev hsr_slave_1 [ 2937.288894] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:40 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:40 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2937.423591] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2937.501600] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.506695] protocol 88fb is buggy, dev hsr_slave_1 01:03:40 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba60e8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:40 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:40 executing program 3: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2937.637083] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2937.660715] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.665821] protocol 88fb is buggy, dev hsr_slave_1 [ 2937.670959] protocol 88fb is buggy, dev hsr_slave_0 [ 2937.676023] protocol 88fb is buggy, dev hsr_slave_1 01:03:40 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:40 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2937.822382] Dev loop0: unable to read RDB block 1 [ 2937.827304] loop0: unable to read partition table [ 2937.927696] loop0: partition table beyond EOD, truncated [ 2937.969844] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2938.107748] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2938.225142] Dev loop0: unable to read RDB block 1 [ 2938.251353] loop0: unable to read partition table [ 2938.277905] loop0: partition table beyond EOD, truncated [ 2938.315119] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2938.511119] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2938.567120] device bridge_slave_1 left promiscuous mode [ 2938.573014] bridge0: port 2(bridge_slave_1) entered disabled state [ 2938.624449] device bridge_slave_0 left promiscuous mode [ 2938.629941] bridge0: port 1(bridge_slave_0) entered disabled state [ 2938.873822] device hsr_slave_1 left promiscuous mode [ 2938.943995] device hsr_slave_0 left promiscuous mode [ 2939.004457] team0 (unregistering): Port device team_slave_1 removed [ 2939.017422] team0 (unregistering): Port device team_slave_0 removed [ 2939.027985] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2939.084664] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2939.170452] bond0 (unregistering): Released all slaves [ 2939.927795] IPVS: ftp: loaded support on port[0] = 21 [ 2940.044587] chnl_net:caif_netlink_parms(): no params data found [ 2940.096558] bridge0: port 1(bridge_slave_0) entered blocking state [ 2940.103468] bridge0: port 1(bridge_slave_0) entered disabled state [ 2940.110786] device bridge_slave_0 entered promiscuous mode [ 2940.118188] bridge0: port 2(bridge_slave_1) entered blocking state [ 2940.124854] bridge0: port 2(bridge_slave_1) entered disabled state [ 2940.132206] device bridge_slave_1 entered promiscuous mode [ 2940.154633] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2940.166214] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2940.196562] team0: Port device team_slave_0 added [ 2940.205010] team0: Port device team_slave_1 added [ 2940.283056] device hsr_slave_0 entered promiscuous mode [ 2940.321050] device hsr_slave_1 entered promiscuous mode [ 2940.413637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2940.426095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2940.434530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2940.444299] 8021q: adding VLAN 0 to HW filter on device team0 [ 2940.454408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2940.462208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2940.469704] bridge0: port 1(bridge_slave_0) entered blocking state [ 2940.476094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2940.483122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2940.495639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2940.503640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2940.511421] bridge0: port 2(bridge_slave_1) entered blocking state [ 2940.517772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2940.538480] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2940.548461] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2940.560251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2940.569254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2940.577381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2940.585917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2940.593806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2940.601863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2940.609562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2940.617345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2940.625396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2940.635057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2940.651683] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 01:03:43 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:43 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:43 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', 0x0, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:43 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:43 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba60f8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:43 executing program 3: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2940.658812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2940.669178] 8021q: adding VLAN 0 to HW filter on device batadv0 01:03:43 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2940.892263] Dev loop0: unable to read RDB block 1 [ 2940.897222] loop0: unable to read partition table 01:03:44 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz'}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:44 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2940.953858] loop0: partition table beyond EOD, truncated [ 2940.976274] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2941.047027] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2941.130494] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:44 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2941.279223] Dev loop0: unable to read RDB block 1 [ 2941.329234] loop0: unable to read partition table 01:03:44 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz'}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:44 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2941.402081] loop0: partition table beyond EOD, truncated [ 2941.408565] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2941.408606] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:03:44 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:44 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6108a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:44 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:44 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2941.592009] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2941.660681] net_ratelimit: 22 callbacks suppressed [ 2941.660689] protocol 88fb is buggy, dev hsr_slave_0 [ 2941.670759] protocol 88fb is buggy, dev hsr_slave_1 01:03:44 executing program 3: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:44 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:44 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz'}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2941.732073] Dev loop0: unable to read RDB block 1 [ 2941.744635] loop0: unable to read partition table 01:03:44 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2941.791024] loop0: partition table beyond EOD, truncated [ 2941.820695] protocol 88fb is buggy, dev hsr_slave_0 [ 2941.825782] protocol 88fb is buggy, dev hsr_slave_1 [ 2941.830907] protocol 88fb is buggy, dev hsr_slave_0 [ 2941.835991] protocol 88fb is buggy, dev hsr_slave_1 [ 2941.905601] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:45 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2941.961849] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2942.001258] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:45 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2942.086134] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:03:45 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2942.144383] Dev loop0: unable to read RDB block 1 [ 2942.157786] loop0: unable to read partition table [ 2942.206806] loop0: partition table beyond EOD, truncated [ 2942.247158] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2942.303354] protocol 88fb is buggy, dev hsr_slave_0 [ 2942.308703] protocol 88fb is buggy, dev hsr_slave_1 01:03:45 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:45 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6118a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:45 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:45 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2942.515955] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2942.591381] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2942.693930] Dev loop0: unable to read RDB block 1 [ 2942.698881] loop0: unable to read partition table [ 2942.700867] protocol 88fb is buggy, dev hsr_slave_0 [ 2942.708871] protocol 88fb is buggy, dev hsr_slave_1 [ 2942.728896] loop0: partition table beyond EOD, truncated [ 2942.750086] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2942.766766] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2942.857921] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:46 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:46 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:46 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:46 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2942.966612] Dev loop0: unable to read RDB block 1 [ 2942.982628] loop0: unable to read partition table 01:03:46 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2943.032587] loop0: partition table beyond EOD, truncated [ 2943.067187] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:46 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2943.131538] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:03:46 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:46 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:46 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6128a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:46 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:46 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2943.265113] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:03:46 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) [ 2943.351679] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:46 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:46 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:46 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:46 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2943.525706] Dev loop0: unable to read RDB block 1 [ 2943.545914] loop0: unable to read partition table 01:03:46 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) [ 2943.577918] loop0: partition table beyond EOD, truncated 01:03:46 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2943.638859] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:46 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2943.730882] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2943.772362] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:46 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2943.856402] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2943.914006] Dev loop0: unable to read RDB block 1 [ 2943.918962] loop0: unable to read partition table [ 2943.966687] loop0: partition table beyond EOD, truncated [ 2943.991114] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6138a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:47 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:47 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 01:03:47 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:47 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:47 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2944.122565] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:47 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:47 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:47 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x0, 0x80000) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:47 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:47 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:47 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x0, 0x80000) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2944.320737] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2944.336621] Dev loop0: unable to read RDB block 1 [ 2944.359242] loop0: unable to read partition table [ 2944.403207] loop0: partition table beyond EOD, truncated [ 2944.448531] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2944.524683] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2944.616632] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2944.670811] Dev loop0: unable to read RDB block 1 [ 2944.675714] loop0: unable to read partition table [ 2944.687589] loop0: partition table beyond EOD, truncated [ 2944.698377] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6148a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:47 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:47 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:47 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x0, 0x80000) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:47 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:47 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:47 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:47 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2944.849365] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:47 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:47 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:48 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2945.030788] Dev loop0: unable to read RDB block 1 [ 2945.035743] loop0: unable to read partition table [ 2945.040251] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:03:48 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2945.087608] loop0: partition table beyond EOD, truncated [ 2945.087640] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2945.216148] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2945.255243] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2945.267081] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2945.387853] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2945.399116] Dev loop0: unable to read RDB block 1 [ 2945.404306] loop0: unable to read partition table [ 2945.409312] loop0: partition table beyond EOD, truncated [ 2945.415217] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2945.431615] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:03:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6158a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:48 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:48 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:48 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:48 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x0, 0x80000) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:48 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:48 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:48 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2945.656387] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2945.677532] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:48 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:48 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x0, 0x80000) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:48 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:48 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2945.852720] Dev loop0: unable to read RDB block 1 [ 2945.857627] loop0: unable to read partition table [ 2945.917493] loop0: partition table beyond EOD, truncated [ 2945.933867] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2946.004535] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2946.078856] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2946.174751] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2946.186588] Dev loop0: unable to read RDB block 1 [ 2946.201709] loop0: unable to read partition table [ 2946.206711] loop0: partition table beyond EOD, truncated [ 2946.217219] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:49 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6168a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:49 executing program 5: request_key(0x0, &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:49 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:49 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:49 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:49 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:49 executing program 5: request_key(0x0, &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2946.348744] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:49 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:49 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:49 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2946.485773] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2946.521497] Dev loop0: unable to read RDB block 1 [ 2946.526455] loop0: unable to read partition table 01:03:49 executing program 5: request_key(0x0, &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2946.566628] loop0: partition table beyond EOD, truncated [ 2946.604978] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:49 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2946.680979] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2946.716878] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2946.829299] Dev loop0: unable to read RDB block 1 [ 2946.850153] loop0: unable to read partition table [ 2946.860687] net_ratelimit: 22 callbacks suppressed [ 2946.860695] protocol 88fb is buggy, dev hsr_slave_0 [ 2946.864185] loop0: partition table beyond EOD, truncated [ 2946.865707] protocol 88fb is buggy, dev hsr_slave_1 [ 2946.871076] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6178a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:50 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:50 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', 0x0, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:50 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:50 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:50 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2947.056173] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:50 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', 0x0, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:50 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:50 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:50 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', 0x0, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2947.243462] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2947.249489] Dev loop0: unable to read RDB block 1 [ 2947.255842] loop0: unable to read partition table [ 2947.260691] protocol 88fb is buggy, dev hsr_slave_0 [ 2947.265836] protocol 88fb is buggy, dev hsr_slave_1 [ 2947.308121] loop0: partition table beyond EOD, truncated [ 2947.314148] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2947.322044] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:03:50 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz'}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:50 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2947.380112] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2947.426496] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2947.491491] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2947.582865] Dev loop0: unable to read RDB block 1 [ 2947.598306] loop0: unable to read partition table [ 2947.624130] loop0: partition table beyond EOD, truncated [ 2947.629686] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6188a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:50 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:50 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:50 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz'}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:50 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:50 executing program 1: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 01:03:50 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 01:03:50 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:50 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz'}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2947.848486] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:50 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2947.900710] protocol 88fb is buggy, dev hsr_slave_0 [ 2947.905819] protocol 88fb is buggy, dev hsr_slave_1 01:03:51 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:51 executing program 1: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) [ 2948.060715] protocol 88fb is buggy, dev hsr_slave_0 [ 2948.065819] protocol 88fb is buggy, dev hsr_slave_1 [ 2948.070964] protocol 88fb is buggy, dev hsr_slave_0 [ 2948.076025] protocol 88fb is buggy, dev hsr_slave_1 [ 2948.099641] Dev loop0: unable to read RDB block 1 [ 2948.118730] loop0: unable to read partition table [ 2948.160318] loop0: partition table beyond EOD, truncated [ 2948.178584] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2948.221254] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2948.283039] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2948.331468] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2948.389665] Dev loop0: unable to read RDB block 1 [ 2948.394998] loop0: unable to read partition table [ 2948.399972] loop0: partition table beyond EOD, truncated [ 2948.405550] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6198a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:51 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:51 executing program 3: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:51 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:51 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:51 executing program 1: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 01:03:51 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2948.532377] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:51 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:51 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) 01:03:51 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:51 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2948.667272] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2948.671361] Dev loop0: unable to read RDB block 1 [ 2948.679597] loop0: unable to read partition table [ 2948.700979] loop0: partition table beyond EOD, truncated [ 2948.706498] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:51 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2948.807458] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2948.915892] Dev loop0: unable to read RDB block 1 [ 2948.940591] loop0: unable to read partition table [ 2948.949167] loop0: partition table beyond EOD, truncated [ 2948.954999] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2948.964712] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:03:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba61a8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:52 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:52 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) 01:03:52 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:52 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:52 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:52 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:52 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:52 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:52 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:52 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) [ 2949.166535] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2949.279164] Dev loop0: unable to read RDB block 1 [ 2949.301601] loop0: unable to read partition table [ 2949.332871] loop0: partition table beyond EOD, truncated [ 2949.368929] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:52 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2949.482207] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2949.556307] Dev loop0: unable to read RDB block 1 [ 2949.573464] loop0: unable to read partition table [ 2949.578496] loop0: partition table beyond EOD, truncated [ 2949.631338] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2949.662768] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2949.706687] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:03:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba61b8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:52 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:52 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:52 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:52 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:52 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:52 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2949.887612] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:53 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 01:03:53 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2950.071971] Dev loop0: unable to read RDB block 1 [ 2950.090829] loop0: unable to read partition table [ 2950.146510] loop0: partition table beyond EOD, truncated [ 2950.160794] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:53 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2950.211691] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:53 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:53 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 2950.263780] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2950.334352] Dev loop0: unable to read RDB block 1 [ 2950.366897] loop0: unable to read partition table [ 2950.379592] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2950.387468] loop0: partition table beyond EOD, truncated [ 2950.434689] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba61c8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:53 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:53 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:53 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 01:03:53 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2950.671516] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:53 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:53 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:53 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:53 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2950.851701] Dev loop0: unable to read RDB block 1 [ 2950.856733] loop0: unable to read partition table [ 2950.863150] loop0: partition table beyond EOD, truncated [ 2950.868784] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:54 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:54 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2950.991609] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba61d8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2951.049460] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:03:54 executing program 5: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) [ 2951.184269] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:03:54 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2951.274928] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:03:54 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:54 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2951.315316] Dev loop0: unable to read RDB block 1 [ 2951.320246] loop0: unable to read partition table [ 2951.355080] loop0: partition table beyond EOD, truncated 01:03:54 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2951.375789] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:03:54 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2951.445844] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:54 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:54 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2951.549583] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:54 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2951.677974] Dev loop0: unable to read RDB block 1 [ 2951.686004] loop0: unable to read partition table [ 2951.711867] loop0: partition table beyond EOD, truncated [ 2951.717434] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:54 executing program 1: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba61e8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2951.914410] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:03:55 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:55 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:55 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2952.006783] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2952.061237] net_ratelimit: 18 callbacks suppressed [ 2952.061272] protocol 88fb is buggy, dev hsr_slave_0 [ 2952.071899] protocol 88fb is buggy, dev hsr_slave_1 [ 2952.093822] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2952.223498] protocol 88fb is buggy, dev hsr_slave_0 [ 2952.229097] protocol 88fb is buggy, dev hsr_slave_1 [ 2952.234669] protocol 88fb is buggy, dev hsr_slave_0 [ 2952.240207] protocol 88fb is buggy, dev hsr_slave_1 01:03:55 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2952.299422] Dev loop0: unable to read RDB block 1 01:03:55 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(0x0, &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2952.340968] loop0: unable to read partition table 01:03:55 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2952.394575] loop0: partition table beyond EOD, truncated [ 2952.456554] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2952.547454] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:55 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2952.671153] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) [ 2952.700692] protocol 88fb is buggy, dev hsr_slave_0 [ 2952.705772] protocol 88fb is buggy, dev hsr_slave_1 01:03:55 executing program 1: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:55 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x0, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2952.827516] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2952.840572] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 01:03:55 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(0x0, &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6218a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2952.970144] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:03:56 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x0, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2953.060335] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:03:56 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2953.100984] protocol 88fb is buggy, dev hsr_slave_0 [ 2953.106221] protocol 88fb is buggy, dev hsr_slave_1 [ 2953.169676] Dev loop0: unable to read RDB block 1 [ 2953.179595] loop0: unable to read partition table [ 2953.190297] loop0: partition table beyond EOD, truncated [ 2953.205991] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2953.235679] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:03:56 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x0, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2953.301231] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:03:56 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2953.368042] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2953.449455] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2953.495406] Dev loop0: unable to read RDB block 1 [ 2953.568181] loop0: unable to read partition table [ 2953.599313] loop0: partition table beyond EOD, truncated [ 2953.606565] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:03:56 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2953.640410] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:56 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2953.691916] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:03:56 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:56 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:57 executing program 1: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:03:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6228a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2953.987904] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:57 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2954.132184] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2954.202799] Dev loop0: unable to read RDB block 1 [ 2954.212755] loop0: unable to read partition table [ 2954.239976] loop0: partition table beyond EOD, truncated 01:03:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2954.255686] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2954.283740] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:57 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2954.398923] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:57 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:57 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2954.557009] Dev loop0: unable to read RDB block 1 [ 2954.590779] loop0: unable to read partition table 01:03:57 executing program 2: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2954.641058] loop0: partition table beyond EOD, truncated [ 2954.646616] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2954.704530] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:03:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:03:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6238a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:58 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2954.926466] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2954.961388] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2955.151557] Dev loop0: unable to read RDB block 1 [ 2955.156501] loop0: unable to read partition table 01:03:58 executing program 2: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:58 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2955.222140] loop0: partition table beyond EOD, truncated [ 2955.261012] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:58 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:58 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:58 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2955.382015] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:58 executing program 2: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2955.558537] Dev loop0: unable to read RDB block 1 [ 2955.571820] loop0: unable to read partition table [ 2955.576827] loop0: partition table beyond EOD, truncated 01:03:58 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2955.666397] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:03:58 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:58 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6248a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2955.883255] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:59 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:59 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:59 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2956.051243] Dev loop0: unable to read RDB block 1 [ 2956.056183] loop0: unable to read partition table [ 2956.117592] loop0: partition table beyond EOD, truncated [ 2956.165750] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2956.237151] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:59 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:59 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:59 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:59 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:59 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6258a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:03:59 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:59 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:03:59 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2956.581667] Dev loop0: unable to read RDB block 1 [ 2956.592593] loop0: unable to read partition table [ 2956.615190] loop0: partition table beyond EOD, truncated 01:03:59 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2956.649051] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2956.722165] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:03:59 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:59 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:03:59 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2956.865044] Dev loop0: unable to read RDB block 1 [ 2956.869971] loop0: unable to read partition table [ 2956.876985] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:00 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2956.941054] loop0: partition table beyond EOD, truncated [ 2956.946927] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2956.986788] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:00 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:00 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6268a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2957.206478] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:00 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2957.261497] net_ratelimit: 22 callbacks suppressed [ 2957.261504] protocol 88fb is buggy, dev hsr_slave_0 [ 2957.272018] protocol 88fb is buggy, dev hsr_slave_1 01:04:00 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) 01:04:00 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:00 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2957.390001] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) [ 2957.431755] Dev loop0: unable to read RDB block 1 [ 2957.455224] loop0: unable to read partition table [ 2957.497062] loop0: partition table beyond EOD, truncated [ 2957.509017] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2957.558494] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 01:04:00 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2957.606907] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:00 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) 01:04:00 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) 01:04:00 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2957.660731] protocol 88fb is buggy, dev hsr_slave_0 [ 2957.665831] protocol 88fb is buggy, dev hsr_slave_1 [ 2957.753688] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2957.766311] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6278a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:00 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) [ 2957.877608] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2957.941201] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:04:01 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:01 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2958.016297] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 01:04:01 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) [ 2958.132939] Dev loop0: unable to read RDB block 1 01:04:01 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2958.157964] loop0: unable to read partition table [ 2958.177286] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2958.193194] loop0: partition table beyond EOD, truncated [ 2958.230729] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2958.311302] protocol 88fb is buggy, dev hsr_slave_0 [ 2958.317129] protocol 88fb is buggy, dev hsr_slave_1 [ 2958.332119] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2958.373557] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:01 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:01 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6288a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2958.460741] protocol 88fb is buggy, dev hsr_slave_0 [ 2958.465831] protocol 88fb is buggy, dev hsr_slave_1 [ 2958.470977] protocol 88fb is buggy, dev hsr_slave_0 [ 2958.476035] protocol 88fb is buggy, dev hsr_slave_1 [ 2958.496600] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) [ 2958.548129] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2958.616762] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 01:04:01 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, &(0x7f00000017c0)) 01:04:01 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) [ 2958.706928] Dev loop0: unable to read RDB block 1 [ 2958.719400] loop0: unable to read partition table 01:04:01 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:01 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) [ 2958.777110] loop0: partition table beyond EOD, truncated [ 2958.806300] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2958.863123] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2958.916403] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2958.978335] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:04:02 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:02 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6298a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:02 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2959.115123] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2959.231692] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) [ 2959.298765] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) [ 2959.320436] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2959.386489] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 01:04:02 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, &(0x7f00000017c0)) [ 2959.446611] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2959.491796] Dev loop0: unable to read RDB block 1 [ 2959.502572] loop0: unable to read partition table [ 2959.529117] loop0: partition table beyond EOD, truncated 01:04:02 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:02 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) 01:04:02 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, &(0x7f00000017c0)) [ 2959.556225] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2959.672398] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2959.787027] Dev loop0: unable to read RDB block 1 01:04:02 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:02 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2959.818236] loop0: unable to read partition table [ 2959.829216] loop0: partition table beyond EOD, truncated [ 2959.842917] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:03 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, &(0x7f00000017c0)) 01:04:03 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2959.982368] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) 01:04:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba62a8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:03 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{0x0, 0x0, 0x136}]) [ 2960.127308] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) [ 2960.141160] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2960.173710] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:03 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:03 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{0x0, 0x0, 0x136}]) [ 2960.297965] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2960.335606] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:03 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:03 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x0, 0x0) 01:04:03 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{0x0, 0x0, 0x136}]) [ 2960.447626] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:04:03 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2960.542953] Dev loop0: unable to read RDB block 1 [ 2960.560882] loop0: unable to read partition table [ 2960.565955] loop0: partition table beyond EOD, truncated 01:04:03 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:03 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2960.615840] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:03 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2960.717783] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2960.847228] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba62b8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2960.951681] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) [ 2960.995745] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:04 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2961.045849] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2961.059876] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:04 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400), 0x0, 0x136}]) 01:04:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2961.171638] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2961.279648] Dev loop0: unable to read RDB block 1 [ 2961.294946] loop0: unable to read partition table [ 2961.319018] loop0: partition table beyond EOD, truncated 01:04:04 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2961.361821] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2961.427246] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:04 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2961.566459] EXT4-fs (sda1): re-mounted. Opts: 01:04:04 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400), 0x0, 0x136}]) [ 2961.603647] Dev loop0: unable to read RDB block 1 [ 2961.608545] loop0: unable to read partition table [ 2961.685338] loop0: partition table beyond EOD, truncated 01:04:04 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400), 0x0, 0x136}]) [ 2961.767665] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 01:04:04 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2961.959516] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2962.029907] EXT4-fs (sda1): re-mounted. Opts: [ 2962.414423] device bridge_slave_1 left promiscuous mode [ 2962.419961] bridge0: port 2(bridge_slave_1) entered disabled state [ 2962.460697] net_ratelimit: 18 callbacks suppressed [ 2962.460706] protocol 88fb is buggy, dev hsr_slave_0 [ 2962.470750] protocol 88fb is buggy, dev hsr_slave_1 [ 2962.501671] device bridge_slave_0 left promiscuous mode [ 2962.507162] bridge0: port 1(bridge_slave_0) entered disabled state [ 2962.620701] protocol 88fb is buggy, dev hsr_slave_0 [ 2962.625806] protocol 88fb is buggy, dev hsr_slave_1 [ 2962.630961] protocol 88fb is buggy, dev hsr_slave_0 [ 2962.636030] protocol 88fb is buggy, dev hsr_slave_1 [ 2962.713321] device hsr_slave_1 left promiscuous mode [ 2962.786302] device hsr_slave_0 left promiscuous mode [ 2962.846064] team0 (unregistering): Port device team_slave_1 removed [ 2962.856830] team0 (unregistering): Port device team_slave_0 removed [ 2962.868734] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2962.938244] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2963.027284] bond0 (unregistering): Released all slaves [ 2963.500672] protocol 88fb is buggy, dev hsr_slave_0 [ 2963.505863] protocol 88fb is buggy, dev hsr_slave_1 [ 2963.829103] IPVS: ftp: loaded support on port[0] = 21 [ 2963.900700] protocol 88fb is buggy, dev hsr_slave_0 [ 2963.905953] protocol 88fb is buggy, dev hsr_slave_1 [ 2963.955372] chnl_net:caif_netlink_parms(): no params data found [ 2964.016422] bridge0: port 1(bridge_slave_0) entered blocking state [ 2964.028301] bridge0: port 1(bridge_slave_0) entered disabled state [ 2964.036794] device bridge_slave_0 entered promiscuous mode [ 2964.049358] bridge0: port 2(bridge_slave_1) entered blocking state [ 2964.057113] bridge0: port 2(bridge_slave_1) entered disabled state [ 2964.069492] device bridge_slave_1 entered promiscuous mode [ 2964.097207] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2964.113010] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2964.139580] team0: Port device team_slave_0 added [ 2964.156636] team0: Port device team_slave_1 added [ 2964.223400] device hsr_slave_0 entered promiscuous mode [ 2964.270904] device hsr_slave_1 entered promiscuous mode [ 2964.383534] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2964.397264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2964.404864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2964.414597] 8021q: adding VLAN 0 to HW filter on device team0 [ 2964.424419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2964.432755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2964.440406] bridge0: port 1(bridge_slave_0) entered blocking state [ 2964.446819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2964.454810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2964.471007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2964.478847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2964.487367] bridge0: port 2(bridge_slave_1) entered blocking state [ 2964.493777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2964.502201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2964.510171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2964.525308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2964.537483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2964.547585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2964.558238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2964.576547] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2964.586353] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2964.600116] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2964.607213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2964.615422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2964.623085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2964.648572] 8021q: adding VLAN 0 to HW filter on device batadv0 01:04:07 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x1, 0x8000) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 01:04:07 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba62c8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:07 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b69", 0x57, 0x136}]) 01:04:07 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000077000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) 01:04:07 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 01:04:07 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b69", 0x57, 0x136}]) [ 2964.826267] audit: type=1400 audit(3847.873:107): avc: denied { map } for pid=16285 comm="syz-executor.3" path="socket:[839001]" dev="sockfs" ino=839001 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 [ 2964.831284] Dev loop0: unable to read RDB block 1 [ 2964.890231] EXT4-fs (sda1): re-mounted. Opts: 01:04:07 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2964.914837] loop0: unable to read partition table [ 2964.936862] loop0: partition table beyond EOD, truncated [ 2964.947471] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:08 executing program 1: r0 = open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x0) lseek(r0, 0x0, 0x41001) write(r0, &(0x7f0000000300)="078314966f4808810f847631cb0b3c99e25bc6262c15d67cfbb0e29c509a0b29a1197f22e9e7edcbf3c7b189650bf2abf0097a8c0b385fddea47255862e129119c300baee9ff7c06a36d9e2272a82e17a3c48b1d51fb5653f372965ab760850b3c86e0efa77c072e548f1ff10da0e6a33145a9c6707d89456996568340f504f59a0570b38dccd11c597f1a194e833b9e4e104c3451921aea6c13082b3e76666dcb9c2757666653dd8b625fa711773d869f020415cccf2fb1a410858a9ca3f0a4bc369fa8efeb91aa04255fd83117ae9f69240283e06ca18b0b87df00ab5dc3ee0f1f63cafa3f", 0xe6) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000002280)="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", 0x1000}], 0x1) write(r0, &(0x7f0000000840)="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", 0x1000) preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/37, 0xfffffde0}], 0x1, 0x0) 01:04:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000200000002, &(0x7f00000002c0)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004000, &(0x7f000006ffe4)={0xa, 0x1000004e20, 0x0, @loopback}, 0x1c) [ 2965.054648] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2965.167215] Dev loop0: unable to read RDB block 1 01:04:08 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:08 executing program 3: open(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0xffffffffffffffff}, 0x2c) 01:04:08 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, &(0x7f0000000100)={0x1000}, 0x8) [ 2965.214030] loop0: unable to read partition table [ 2965.219098] loop0: partition table beyond EOD, truncated [ 2965.271066] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba62d8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:08 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b69", 0x57, 0x136}]) 01:04:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000006100), 0x0, 0x0, 0x0) [ 2965.431856] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2965.569584] Dev loop0: unable to read RDB block 1 01:04:08 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2965.593609] loop0: unable to read partition table [ 2965.605871] loop0: partition table beyond EOD, truncated [ 2965.643231] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:08 executing program 5: 01:04:08 executing program 3: 01:04:08 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(0x0, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2965.781306] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2965.797013] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:08 executing program 5: [ 2965.871481] Dev loop0: unable to read RDB block 1 [ 2965.876512] loop0: unable to read partition table [ 2965.893551] loop0: partition table beyond EOD, truncated [ 2965.904820] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:09 executing program 3: [ 2965.942736] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:09 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(0x0, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:09 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5f", 0x82, 0x136}]) [ 2966.081747] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:09 executing program 1: 01:04:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba62e8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:09 executing program 5: 01:04:09 executing program 3: 01:04:09 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(0x0, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:09 executing program 5: 01:04:09 executing program 3: 01:04:09 executing program 1: [ 2966.469999] Dev loop0: unable to read RDB block 1 [ 2966.490785] loop0: unable to read partition table [ 2966.495951] loop0: partition table beyond EOD, truncated [ 2966.540395] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:09 executing program 5: 01:04:09 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040), &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:09 executing program 3: 01:04:09 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5f", 0x82, 0x136}]) 01:04:09 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0xfe69) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 2966.616618] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2966.732297] Dev loop0: unable to read RDB block 1 [ 2966.737554] loop0: unable to read partition table [ 2966.771072] loop0: partition table beyond EOD, truncated [ 2966.804097] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba62f8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:09 executing program 5: 01:04:09 executing program 3: 01:04:09 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040), &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:09 executing program 5: [ 2966.962428] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:10 executing program 3: 01:04:10 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040), &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:10 executing program 5: 01:04:10 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5f", 0x82, 0x136}]) 01:04:10 executing program 3: [ 2967.262325] Dev loop0: unable to read RDB block 1 [ 2967.267267] loop0: unable to read partition table 01:04:10 executing program 5: [ 2967.343041] loop0: partition table beyond EOD, truncated [ 2967.416923] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2967.521355] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2967.529561] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2967.586106] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:10 executing program 1: [ 2967.660771] net_ratelimit: 26 callbacks suppressed [ 2967.660780] protocol 88fb is buggy, dev hsr_slave_0 [ 2967.670872] protocol 88fb is buggy, dev hsr_slave_1 [ 2967.697122] Dev loop0: unable to read RDB block 1 [ 2967.709370] loop0: unable to read partition table [ 2967.720824] loop0: partition table beyond EOD, truncated [ 2967.726351] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6308a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:10 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:10 executing program 3: 01:04:10 executing program 5: 01:04:10 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474", 0x98, 0x136}]) 01:04:10 executing program 1: 01:04:10 executing program 3: 01:04:10 executing program 1: 01:04:11 executing program 5: [ 2967.932045] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:11 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2968.061641] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.067279] protocol 88fb is buggy, dev hsr_slave_1 01:04:11 executing program 1: 01:04:11 executing program 3: [ 2968.209609] Dev loop0: unable to read RDB block 1 [ 2968.234100] loop0: unable to read partition table [ 2968.261455] loop0: partition table beyond EOD, truncated [ 2968.267005] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2968.381068] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6318a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:11 executing program 5: 01:04:11 executing program 1: 01:04:11 executing program 3: 01:04:11 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474", 0x98, 0x136}]) 01:04:11 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2968.464692] Dev loop0: unable to read RDB block 1 [ 2968.469638] loop0: unable to read partition table [ 2968.481742] loop0: partition table beyond EOD, truncated [ 2968.487243] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:11 executing program 5: 01:04:11 executing program 1: 01:04:11 executing program 3: [ 2968.602286] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2968.700830] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.706481] protocol 88fb is buggy, dev hsr_slave_1 01:04:11 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:11 executing program 5: [ 2968.769537] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:11 executing program 1: [ 2968.812281] Dev loop0: unable to read RDB block 1 [ 2968.817220] loop0: unable to read partition table [ 2968.862563] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.867661] protocol 88fb is buggy, dev hsr_slave_1 [ 2968.872814] protocol 88fb is buggy, dev hsr_slave_0 [ 2968.877871] protocol 88fb is buggy, dev hsr_slave_1 [ 2968.897923] loop0: partition table beyond EOD, truncated [ 2968.933975] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2968.950116] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2969.032390] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2969.103734] Dev loop0: unable to read RDB block 1 [ 2969.108645] loop0: unable to read partition table [ 2969.117501] loop0: partition table beyond EOD, truncated [ 2969.123417] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:12 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6328a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:12 executing program 3: 01:04:12 executing program 5: 01:04:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="92", 0x1) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:04:12 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:12 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474", 0x98, 0x136}]) 01:04:12 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b6", 0xa3, 0x136}]) 01:04:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x10e) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") connect$unix(r1, &(0x7f00000002c0)=@abs={0x1}, 0x3a) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 2969.265737] encrypted_key: insufficient parameters specified [ 2969.281992] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)={0x0, 0x0, 0x5, 0x0, 0x12}) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) exit_group(0x0) r3 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r3, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) io_setup(0x0, &(0x7f0000000200)=0x0) io_submit(r4, 0x4, &(0x7f0000000840)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f00000002c0)="9867fa437cb9a45e5062ee295d63467547f5caa78c56f4cbf328de4f6d", 0x1d, 0xa0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, r2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x6, 0x0, r3, 0x0}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x8001, 0x0, 0x0, r1}]) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) [ 2969.372575] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:12 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2969.476720] Dev loop0: unable to read RDB block 1 [ 2969.481912] loop0: unable to read partition table [ 2969.500065] loop0: partition table beyond EOD, truncated [ 2969.525200] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:12 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b6", 0xa3, 0x136}]) [ 2969.578900] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') fsetxattr(r0, 0x0, 0x0, 0x0, 0x0) [ 2969.658350] Dev loop0: unable to read RDB block 1 [ 2969.691403] loop0: unable to read partition table [ 2969.696451] loop0: partition table beyond EOD, truncated [ 2969.800935] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:12 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6338a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:12 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5f", 0x82, 0x136}]) 01:04:12 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:13 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5f", 0x82, 0x136}]) 01:04:13 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2969.998922] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2970.056650] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:13 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b69", 0x57, 0x136}]) [ 2970.131439] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:13 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b6", 0xa3, 0x136}]) [ 2970.243986] Dev loop0: unable to read RDB block 1 [ 2970.249375] loop0: unable to read partition table 01:04:13 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5f", 0x82, 0x136}]) [ 2970.286704] loop0: partition table beyond EOD, truncated [ 2970.301060] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2970.309808] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:04:13 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2970.491593] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2970.509803] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:04:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6348a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2970.581542] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) [ 2970.599789] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:13 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2970.662854] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2970.761516] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2970.815538] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2970.821907] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:13 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b69", 0x57, 0x136}]) 01:04:13 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400), 0x0, 0x136}]) 01:04:14 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14", 0xa8, 0x136}]) [ 2970.941797] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2971.006273] Dev loop0: unable to read RDB block 1 [ 2971.014439] loop0: unable to read partition table [ 2971.039022] loop0: partition table beyond EOD, truncated 01:04:14 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5f", 0x82, 0x136}]) [ 2971.086565] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:14 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14", 0xa8, 0x136}]) 01:04:14 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2971.263912] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2971.321289] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) [ 2971.328481] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:14 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:14 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14", 0xa8, 0x136}]) [ 2971.422669] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) [ 2971.475028] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2971.476775] Dev loop0: unable to read RDB block 1 [ 2971.516007] loop0: unable to read partition table [ 2971.525340] loop0: partition table beyond EOD, truncated [ 2971.533193] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2971.583957] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2971.610857] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 01:04:14 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6358a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:14 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b69", 0x57, 0x136}]) [ 2971.682162] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:14 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) 01:04:14 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:14 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400), 0x0, 0x136}]) [ 2971.724908] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2971.761866] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:15 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14", 0xa8, 0x136}]) 01:04:15 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400), 0x0, 0x136}]) 01:04:15 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2972.093664] Dev loop0: unable to read RDB block 1 [ 2972.098804] loop0: unable to read partition table [ 2972.127413] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:04:15 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2972.159839] loop0: partition table beyond EOD, truncated [ 2972.191629] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:15 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2972.256044] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2972.292913] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2972.350876] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2972.364779] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 01:04:15 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b69", 0x57, 0x136}]) [ 2972.414251] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) 01:04:15 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2972.465626] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2972.520298] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:04:15 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6378a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:15 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2972.575470] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 01:04:15 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) 01:04:15 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2972.731382] Dev loop0: unable to read RDB block 1 [ 2972.745718] loop0: unable to read partition table 01:04:15 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:15 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) [ 2972.781226] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) [ 2972.838966] loop0: partition table beyond EOD, truncated [ 2972.860681] net_ratelimit: 18 callbacks suppressed [ 2972.860689] protocol 88fb is buggy, dev hsr_slave_0 [ 2972.870777] protocol 88fb is buggy, dev hsr_slave_1 [ 2972.885808] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:16 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f3", 0xac, 0x136}]) [ 2972.913118] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 01:04:16 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2972.991270] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2973.020722] protocol 88fb is buggy, dev hsr_slave_0 [ 2973.025869] protocol 88fb is buggy, dev hsr_slave_1 [ 2973.031020] protocol 88fb is buggy, dev hsr_slave_0 [ 2973.036077] protocol 88fb is buggy, dev hsr_slave_1 [ 2973.073102] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) 01:04:16 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) [ 2973.141194] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:16 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba63c8a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:16 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:16 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f3", 0xac, 0x136}]) [ 2973.257955] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 01:04:16 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2973.341864] protocol 88fb is buggy, dev hsr_slave_0 [ 2973.347534] protocol 88fb is buggy, dev hsr_slave_1 [ 2973.412389] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:04:16 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:16 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) [ 2973.519518] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:04:16 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2973.615496] Dev loop0: unable to read RDB block 1 [ 2973.620563] loop0: unable to read partition table [ 2973.637355] loop0: partition table beyond EOD, truncated [ 2973.646686] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2973.682103] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2973.751416] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2973.798453] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:16 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) 01:04:16 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2973.900750] protocol 88fb is buggy, dev hsr_slave_0 [ 2973.905884] protocol 88fb is buggy, dev hsr_slave_1 [ 2973.917057] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2973.947084] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:17 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f3", 0xac, 0x136}]) [ 2974.021216] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) 01:04:17 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6518a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2974.075163] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:04:17 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2974.160318] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:04:17 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) [ 2974.219456] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 01:04:17 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:17 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2974.360031] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2974.441112] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:17 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad}]) 01:04:17 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) [ 2974.544015] Dev loop0: unable to read RDB block 1 [ 2974.555577] loop0: unable to read partition table [ 2974.572019] loop0: partition table beyond EOD, truncated [ 2974.581623] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2974.597949] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2974.631311] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:17 executing program 4: syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 01:04:17 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f3", 0xac, 0x136}]) 01:04:17 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad}]) [ 2974.655374] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2974.718683] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2974.791533] Dev loop0: unable to read RDB block 1 [ 2974.796471] loop0: unable to read partition table 01:04:17 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4", 0xab, 0x136}]) [ 2974.840811] loop0: partition table beyond EOD, truncated [ 2974.846385] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:17 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f3", 0xac, 0x136}]) 01:04:18 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6638a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:18 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad}]) 01:04:18 executing program 4: syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 01:04:18 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2975.078261] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2975.234754] Dev loop0: unable to read RDB block 1 [ 2975.254901] loop0: unable to read partition table 01:04:18 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:18 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2975.279506] loop0: partition table beyond EOD, truncated [ 2975.291131] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:18 executing program 4: syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 01:04:18 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:18 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2975.383939] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2975.391630] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2975.512023] Dev loop0: unable to read RDB block 1 [ 2975.523487] loop0: unable to read partition table [ 2975.537718] loop0: partition table beyond EOD, truncated [ 2975.570310] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:18 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x80, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:18 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:18 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6648a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:18 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) [ 2975.679603] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:18 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x0, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2975.762118] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2975.806083] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:18 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) [ 2975.873090] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:04:19 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) [ 2975.996989] Dev loop0: unable to read RDB block 1 01:04:19 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2976.039807] loop0: unable to read partition table 01:04:19 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) 01:04:19 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2976.110867] loop0: partition table beyond EOD, truncated [ 2976.126667] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:19 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 01:04:19 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2976.231770] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:19 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3351f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:19 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:19 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2976.381870] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:19 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) [ 2976.441566] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:04:19 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2976.511412] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2976.602321] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 01:04:19 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:19 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2976.671463] Dev loop0: unable to read RDB block 1 [ 2976.709702] loop0: unable to read partition table 01:04:19 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:19 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2976.742156] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2976.774612] loop0: partition table beyond EOD, truncated [ 2976.783820] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2976.831796] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2976.865673] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:20 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2976.971662] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:20 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2977.019626] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:04:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3361f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2977.071696] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 01:04:20 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:20 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2977.189511] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 01:04:20 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2977.240998] Dev loop0: unable to read RDB block 1 [ 2977.260865] loop0: unable to read partition table 01:04:20 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2977.299321] loop0: partition table beyond EOD, truncated 01:04:20 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2977.363415] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:20 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2977.432286] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:20 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:20 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2977.564419] Dev loop0: unable to read RDB block 1 [ 2977.569366] loop0: unable to read partition table [ 2977.611552] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2977.660238] loop0: partition table beyond EOD, truncated 01:04:20 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:20 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:20 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2977.706712] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2977.729704] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2977.830297] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) 01:04:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b33c1f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:21 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:21 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2977.979016] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2978.019728] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2978.060728] net_ratelimit: 22 callbacks suppressed [ 2978.060736] protocol 88fb is buggy, dev hsr_slave_0 [ 2978.070772] protocol 88fb is buggy, dev hsr_slave_1 [ 2978.174977] loop_reread_partitions: partition scan of loop5 () failed (rc=-13) 01:04:21 executing program 3: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2978.231939] Dev loop0: unable to read RDB block 1 [ 2978.236848] loop0: unable to read partition table [ 2978.270885] loop0: partition table beyond EOD, truncated 01:04:21 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:21 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:21 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2978.285130] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2978.317693] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2978.361610] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:21 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:21 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2978.461034] protocol 88fb is buggy, dev hsr_slave_0 [ 2978.466164] protocol 88fb is buggy, dev hsr_slave_1 01:04:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3511f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:21 executing program 5: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) 01:04:21 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:21 executing program 2: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) 01:04:21 executing program 3: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) [ 2978.701642] Dev loop0: unable to read RDB block 1 [ 2978.706566] loop0: unable to read partition table [ 2978.742089] loop0: partition table beyond EOD, truncated [ 2978.747603] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:21 executing program 4: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) 01:04:21 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:21 executing program 5: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) 01:04:21 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2978.974126] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2979.111939] protocol 88fb is buggy, dev hsr_slave_0 [ 2979.117037] protocol 88fb is buggy, dev hsr_slave_1 [ 2979.130661] Dev loop0: unable to read RDB block 1 [ 2979.135557] loop0: unable to read partition table [ 2979.140539] loop0: partition table beyond EOD, truncated 01:04:22 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2979.200804] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:22 executing program 5: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b32735807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2979.260699] protocol 88fb is buggy, dev hsr_slave_0 [ 2979.265870] protocol 88fb is buggy, dev hsr_slave_1 [ 2979.271012] protocol 88fb is buggy, dev hsr_slave_0 [ 2979.276078] protocol 88fb is buggy, dev hsr_slave_1 [ 2979.361103] loop_reread_partitions: partition scan of loop3 () failed (rc=-13) [ 2979.368704] loop_reread_partitions: partition scan of loop1 () failed (rc=-13) [ 2979.404581] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:22 executing program 5: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) [ 2979.471415] loop_reread_partitions: partition scan of loop4 () failed (rc=-13) [ 2979.526078] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 2979.560386] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 01:04:22 executing program 3: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) [ 2979.651513] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 01:04:22 executing program 1: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) [ 2979.719649] Dev loop0: unable to read RDB block 1 [ 2979.727090] loop0: unable to read partition table [ 2979.759615] loop0: partition table beyond EOD, truncated [ 2979.820835] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2979.875208] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2979.971992] device bridge_slave_1 left promiscuous mode [ 2979.977520] bridge0: port 2(bridge_slave_1) entered disabled state [ 2980.042488] device bridge_slave_0 left promiscuous mode [ 2980.043419] Dev loop0: unable to read RDB block 1 [ 2980.061701] loop0: unable to read partition table [ 2980.068401] bridge0: port 1(bridge_slave_0) entered disabled state [ 2980.076882] loop0: partition table beyond EOD, truncated [ 2980.097067] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2980.261916] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2980.303832] device hsr_slave_1 left promiscuous mode [ 2980.334183] device hsr_slave_0 left promiscuous mode [ 2980.376920] team0 (unregistering): Port device team_slave_1 removed [ 2980.400785] team0 (unregistering): Port device team_slave_0 removed [ 2980.427509] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2980.476686] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2980.577231] bond0 (unregistering): Released all slaves [ 2981.582774] IPVS: ftp: loaded support on port[0] = 21 [ 2981.666113] chnl_net:caif_netlink_parms(): no params data found [ 2981.712387] bridge0: port 1(bridge_slave_0) entered blocking state [ 2981.718793] bridge0: port 1(bridge_slave_0) entered disabled state [ 2981.725882] device bridge_slave_0 entered promiscuous mode [ 2981.733033] bridge0: port 2(bridge_slave_1) entered blocking state [ 2981.739402] bridge0: port 2(bridge_slave_1) entered disabled state [ 2981.746607] device bridge_slave_1 entered promiscuous mode [ 2981.767584] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2981.777053] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2981.795168] team0: Port device team_slave_0 added [ 2981.801671] team0: Port device team_slave_1 added [ 2981.862314] device hsr_slave_0 entered promiscuous mode [ 2981.911165] device hsr_slave_1 entered promiscuous mode [ 2981.987780] bridge0: port 2(bridge_slave_1) entered blocking state [ 2981.994157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2982.000820] bridge0: port 1(bridge_slave_0) entered blocking state [ 2982.007158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2982.040049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2982.051379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2982.058497] bridge0: port 1(bridge_slave_0) entered disabled state [ 2982.066183] bridge0: port 2(bridge_slave_1) entered disabled state [ 2982.075322] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2982.086848] 8021q: adding VLAN 0 to HW filter on device team0 [ 2982.097521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2982.105234] bridge0: port 1(bridge_slave_0) entered blocking state [ 2982.111584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2982.121627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2982.129257] bridge0: port 2(bridge_slave_1) entered blocking state [ 2982.135649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2982.151468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2982.165058] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2982.172612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2982.183787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2982.194245] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2982.205707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2982.212865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2982.233387] 8021q: adding VLAN 0 to HW filter on device batadv0 01:04:25 executing program 2: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, 0x0) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 5: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:25 executing program 3: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 1: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x0, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b32736807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:25 executing program 3: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:25 executing program 2: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, 0x0) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 1: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, 0x0) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) [ 2982.480313] Dev loop0: unable to read RDB block 1 [ 2982.491960] loop0: unable to read partition table [ 2982.510965] loop0: partition table beyond EOD, truncated [ 2982.516517] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2982.531555] loop_reread_partitions: partition scan of loop4 () failed (rc=-13) [ 2982.593445] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:25 executing program 3: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)=0x0) sched_setscheduler(r2, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 1: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setscheduler(0x0, 0x1, 0x0) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:25 executing program 2: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)=0x0) sched_setscheduler(r3, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) [ 2982.642363] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2982.701936] Dev loop0: unable to read RDB block 1 [ 2982.706862] loop0: unable to read partition table [ 2982.736064] loop0: partition table beyond EOD, truncated [ 2982.795184] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:25 executing program 3: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)=0x0) sched_setscheduler(r2, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 01:04:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3273c807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:25 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/icmp6\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000000)) preadv(r0, &(0x7f0000000480), 0x10000000000001b1, 0x10400003) 01:04:25 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000000340)="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", 0x200}]) 01:04:26 executing program 5: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) read$FUSE(r0, &(0x7f0000000140), 0x1000) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2982.992853] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:26 executing program 3: mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)=0x0) sched_setscheduler(r2, 0x1, &(0x7f0000000680)) geteuid() ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000300)={@rand_addr="f86731c4eb1477f85814d6baf182adcf", 0x15}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000004dc0)) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000005080)=0x379) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) [ 2983.077273] loop_reread_partitions: partition scan of loop4 () failed (rc=-13) 01:04:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x7000000, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) [ 2983.122034] Dev loop2 SGI disklabel: csum bad, label corrupted [ 2983.142555] Dev loop2: unable to read RDB block 1 [ 2983.165974] loop2: unable to read partition table [ 2983.173671] Dev loop0: unable to read RDB block 1 [ 2983.180993] loop0: unable to read partition table [ 2983.186006] loop0: partition table beyond EOD, truncated [ 2983.191648] loop2: partition table beyond EOD, truncated [ 2983.203935] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 01:04:26 executing program 5: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) read$FUSE(r0, &(0x7f0000000140), 0x1000) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2983.220576] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2983.234414] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2983.260872] net_ratelimit: 22 callbacks suppressed [ 2983.260879] protocol 88fb is buggy, dev hsr_slave_0 [ 2983.271051] protocol 88fb is buggy, dev hsr_slave_1 [ 2983.321629] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2983.330419] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:26 executing program 4 (fault-call:7 fault-nth:0): r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:26 executing program 2 (fault-call:8 fault-nth:0): r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:26 executing program 5: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) read$FUSE(r0, &(0x7f0000000140), 0x1000) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2983.430761] protocol 88fb is buggy, dev hsr_slave_0 [ 2983.435914] protocol 88fb is buggy, dev hsr_slave_1 [ 2983.441072] protocol 88fb is buggy, dev hsr_slave_0 [ 2983.446144] protocol 88fb is buggy, dev hsr_slave_1 01:04:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b32751807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 2983.583049] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 01:04:26 executing program 1 (fault-call:1 fault-nth:0): request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2983.686200] Dev loop0: unable to read RDB block 1 01:04:26 executing program 5 (fault-call:8 fault-nth:0): r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2983.726116] loop0: unable to read partition table [ 2983.740721] protocol 88fb is buggy, dev hsr_slave_0 [ 2983.745811] protocol 88fb is buggy, dev hsr_slave_1 [ 2983.748289] loop0: partition table beyond EOD, truncated [ 2983.758984] FAULT_INJECTION: forcing a failure. [ 2983.758984] name failslab, interval 1, probability 0, space 0, times 0 [ 2983.771836] CPU: 0 PID: 21544 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #3 [ 2983.779036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2983.779043] Call Trace: [ 2983.779111] dump_stack+0x172/0x1f0 [ 2983.779149] should_fail.cold+0xa/0x1b [ 2983.795528] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2983.798559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2983.798579] ? lock_downgrade+0x810/0x810 [ 2983.815077] ? ___might_sleep+0x163/0x280 [ 2983.819242] __should_failslab+0x121/0x190 01:04:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:26 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2983.823494] should_failslab+0x9/0x14 [ 2983.827296] __kmalloc_track_caller+0x2d8/0x740 [ 2983.831970] ? __check_object_size+0x3d/0x42f [ 2983.836476] ? wait_for_completion+0x440/0x440 [ 2983.841101] ? strndup_user+0x77/0xd0 [ 2983.844922] memdup_user+0x26/0xb0 [ 2983.848481] strndup_user+0x77/0xd0 [ 2983.852166] __x64_sys_add_key+0x19d/0x4f0 [ 2983.856397] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 2983.862322] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2983.867072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2983.872419] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2983.876987] ? trace_hardirqs_on+0x67/0x230 [ 2983.881298] do_syscall_64+0x103/0x610 [ 2983.885181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2983.890458] RIP: 0033:0x457e29 [ 2983.893635] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2983.912522] RSP: 002b:00007f484fecdc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 01:04:27 executing program 1 (fault-call:1 fault-nth:1): request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2983.920215] RAX: ffffffffffffffda RBX: 00007f484fecdc90 RCX: 0000000000457e29 [ 2983.927468] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000180 [ 2983.934724] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 2983.941977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f484fece6d4 [ 2983.949237] R13: 00000000004bdd4a R14: 00000000004ce1a8 R15: 0000000000000003 [ 2984.042817] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2984.049878] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:27 executing program 3 (fault-call:9 fault-nth:0): syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:27 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2984.097459] FAULT_INJECTION: forcing a failure. [ 2984.097459] name failslab, interval 1, probability 0, space 0, times 0 [ 2984.115762] CPU: 0 PID: 21559 Comm: syz-executor.1 Not tainted 5.0.0-rc8+ #3 [ 2984.122978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2984.132349] Call Trace: [ 2984.134952] dump_stack+0x172/0x1f0 [ 2984.138599] should_fail.cold+0xa/0x1b [ 2984.142500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2984.147628] ? lock_downgrade+0x810/0x810 [ 2984.151772] ? ___might_sleep+0x163/0x280 [ 2984.155929] __should_failslab+0x121/0x190 [ 2984.160162] should_failslab+0x9/0x14 [ 2984.163948] kmem_cache_alloc_trace+0x2d1/0x760 [ 2984.168609] assoc_array_insert+0xef/0x2d90 [ 2984.172918] ? avc_has_perm_noaudit+0x570/0x570 [ 2984.177578] ? __lock_is_held+0xb6/0x140 [ 2984.181640] ? assoc_array_cancel_edit+0x90/0x90 [ 2984.186393] ? lock_acquire+0x16f/0x3f0 [ 2984.190358] ? __key_link_begin+0x9d/0x300 [ 2984.194581] __key_link_begin+0x12d/0x300 [ 2984.198714] key_create_or_update+0x3a1/0xba0 [ 2984.203200] ? key_type_lookup+0xf0/0xf0 [ 2984.207267] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2984.212793] ? memdup_user+0x65/0xb0 [ 2984.216497] __x64_sys_add_key+0x2bd/0x4f0 [ 2984.220722] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 2984.226682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2984.231453] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2984.236813] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2984.241386] ? trace_hardirqs_on+0x67/0x230 [ 2984.245714] do_syscall_64+0x103/0x610 [ 2984.249601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2984.254773] RIP: 0033:0x457e29 [ 2984.257962] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2984.276864] RSP: 002b:00007f484fecdc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 2984.284572] RAX: ffffffffffffffda RBX: 00007f484fecdc90 RCX: 0000000000457e29 [ 2984.291828] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000180 [ 2984.299082] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 2984.306342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f484fece6d4 [ 2984.313595] R13: 00000000004bdd4a R14: 00000000004ce1a8 R15: 0000000000000003 [ 2984.321954] protocol 88fb is buggy, dev hsr_slave_0 [ 2984.327037] protocol 88fb is buggy, dev hsr_slave_1 [ 2984.342138] Dev loop0: unable to read RDB block 1 01:04:27 executing program 1 (fault-call:1 fault-nth:2): request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2984.347307] loop0: unable to read partition table [ 2984.360544] loop0: partition table beyond EOD, truncated [ 2984.366462] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2984.387479] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:27 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:27 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:27 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x1fc, 0x133}]) 01:04:27 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:27 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:27 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0xb, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2984.591567] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:27 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='.ncrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:27 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)=0x7) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) prctl$PR_SET_FP_MODE(0x2d, 0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x7, 0x1, 0x4, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:27 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x22, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2984.801535] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:27 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x40003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2984.887178] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2984.895467] Dev loop0: unable to read RDB block 1 [ 2984.900361] loop0: unable to read partition table 01:04:28 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypt.d\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:28 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0xb, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2984.977697] loop0: partition table beyond EOD, truncated 01:04:28 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$cont(0x1f, r2, 0x400000000000000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2985.039194] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:28 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x02', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2985.108778] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2985.214624] Dev loop0: unable to read RDB block 1 [ 2985.219534] loop0: unable to read partition table [ 2985.269894] loop0: partition table beyond EOD, truncated [ 2985.308127] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x10a}]) 01:04:28 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x22, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:28 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x80) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x100000001, 0x0, 0x1, 0x7, 0x7ff, 0x5}, &(0x7f0000000080)=0x20) r1 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@dev, @in6=@empty}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x14) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x8) 01:04:28 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\xff', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:28 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042cbd7000fe771c2501000000000b000000e2ea0ed3b33ddca40073797a3103000000000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:28 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x1000000) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:28 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x3f00) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:28 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encryptedk', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:28 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 2985.470461] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:28 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0xfeffffff) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:28 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000000)=0x17000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2985.641534] Dev loop0: unable to read RDB block 1 [ 2985.659033] loop0: unable to read partition table 01:04:28 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 2985.699908] loop0: partition table beyond EOD, truncated [ 2985.725808] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2985.802365] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2985.895167] Dev loop0: unable to read RDB block 1 [ 2985.900104] loop0: unable to read partition table [ 2985.934074] loop0: partition table beyond EOD, truncated [ 2985.955234] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x125}]) 01:04:29 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\xff', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:29 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0xfffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:29 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4202, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:29 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0xffff, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:29 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x8000001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2986.134856] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:29 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x4000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:29 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:29 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x100000000000000) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2986.310904] Dev loop0: unable to read RDB block 1 [ 2986.320978] loop0: unable to read partition table [ 2986.326239] loop0: partition table beyond EOD, truncated 01:04:29 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = syz_genetlink_get_family_id$tipc(0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f00000002c0), &(0x7f0000000400)=0x18) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b000000000c001473797a310000000062d5bfcfc0925b068d81cd2f366e8e0005d940d661f00d5fee0d06c0fe59cb365f0f5d716b7f4cf7754805b8c72ea466b681722d7adcfea96e6d9f36cb92501afecb15b9e396826147abc25551686c962caaca"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000280)=0x5, 0x4) r2 = accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x2, &(0x7f0000000180)='[\x00'}, 0x30) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r1, 0x405, 0x70bd27, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) setpriority(0x1000000002, r5, 0x1) tgkill(r5, r4, 0x16) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:29 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2986.357354] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2986.459447] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:29 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2986.523722] Dev loop0: unable to read RDB block 1 [ 2986.528669] loop0: unable to read partition table [ 2986.560493] loop0: partition table beyond EOD, truncated [ 2986.590982] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2986.613309] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x130}]) 01:04:29 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0xfeffffff00000000) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:29 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:29 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x7f}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @empty}}, 0x6, 0xb30, 0xfffffffffffffffa, 0x3, 0xe5}, 0x98) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:29 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800fb00", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf25010000000000040000000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r1 = accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) setpriority(0x2, r3, 0x7) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2986.746022] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:29 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0xc0000001, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 2986.812477] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:30 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x1000000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:30 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:30 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r3, 0x469b, 0xa, [0x1, 0xfff, 0xffffffffffffffb1, 0xd9e, 0x4, 0x1ff, 0x3, 0x2, 0xfffffffffffffff7, 0x2]}, &(0x7f0000000280)=0x1c) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:30 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000001280)={0x1bacf914c1baddb, &(0x7f0000000140)=[{}]}) fcntl$getown(r0, 0x9) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000080)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000001200)={0xa, 0x4, &(0x7f0000000200)="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", {0x8, 0x80000001, 0x59455247, 0x1, 0x5, 0x3, 0x8, 0x8c93}}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000012c0)={[], 0x2}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:30 executing program 4: r0 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000680)="e35a7969bbd95bd4b0e4950752175928464231be708b119a89a6d13f0a50f577ebf651fd678d6cfc5e2fa6f46fa0b38c82350a9aa1661d9284da837d24c36a1e1b5d53b78f40605a3c62b855871abe13f3eadc70fe47325a5de5b2c914eac7a03423f992c816b768514031fd12972b59214b2455ed402e1dadddaeeec6653c261a1813a4cf446315fb52cc0906f0e37a63618eceed5db0c5c432ef634e0b6e3e57f554ee94ed534b7ce69940a4cfe7f316d20e6176a423ea36b1dfaede3fd6f4e0cf2d38b38f8706deb5fe8ac6dd92e0c4f1de1c05ec78fe20f46db1b205fdb3e27714b0d9f5759a5dbeef4024c03962934977b31c2237963a17a9e89374cf5a78617762d187d5e9d04849389efd326e6990fda5df1ef63c34e0b79726e430bb8853527cd34be0a3d7911209ed8bf5d6e9cb576f8bb942b39618f3c0ff88634617d5999688d329b00478d6e6f3d28147df25e700482655340383d901f3bf976ba457884ce13eb47ac6a2ad3a8319b8102ed6deeb6b1cca6ade0c0a4bef98cebd165eb19aeb4e07a1116c106e395cf30316c7748feef9de5d7918593962b10e284bdc2e519e9c14f28be56f2e185b7157cc1915ad4380c8f4d661587bc3d3ad76d67bb1817836f6438eb4772e7a6b7fbff360b9d4f278737028662fb9545ea928e271baa3fb6ee14c83a4205203a2375b8d8e5e5f910459b237569fc1e3e645505fb2c09977f5362ab59f36d60ef664b5e6d090f962a5ec7a1c9d7d1b32d8df92e7b68c66b5d807b63adca943ff2ebd273cd975122faeaf6730e29285f7e450e32ba4251f9899128f80c2b50fd579739f9995bc9dd135cc5f2da5259c7c8b6665a1588ea3daa3fa0518988a2c194de8ddaed516f8d7f3d93d2098e2b78a7991a4077fd44579d8182899840179eba22451f220f8530009e18c7c94ea3531a47b0f60697e03cf4e541bc0326de05420c50213274c2d98d0f672d83eae8318e0fba67bc6abdec3fae81a34075f6b13ee2dcfc1fad19fc2a753a4213da33e93b7929ad807048818568d6ec2f56f35a937d90d897040a801ac33a67e72076f5d71e08e50e27cf24ce54fd598d0974490cad95b236d13373d9bdf6ddb954d1416e5ea448413094488eaaccb2f1b2744f9c4b9a484c5d292522dd728aaa78e5c49fde19f9f508a4f08a5480d252022b7463046e42da2574242cf304ca729ab4883a4d4ec0011f78e24a71f9ca777dec39aaffacff59ffe6ec1d0e02ee6d02fb0104a0871310051ea44b797b0ce33a1cf427f4f7a705eef60ffbb8baf418c4401014ee83c268cb6812729bae504527add08b3eb5a34486ac7292482589e9a3461a0ec8c695a9b732d6c4c4bbc158578329dd1f12a7d5ab117fb8d64c7263f534e03e2ab442e7394bdedc948651031abdd9b87baa8624c96f282f7b307871c2fd2e6b86024e9b8c1de45169ebe8beda11fcacfc9ada7658fbf7314da2636f14c5a173e40afd7d4ef8c6d33de6d2153c3c88096a4dea53ee7fbbcfb5ad5315ed47ca3a2ed9b153f69ce0034795acccbf991fe80586e2efeaf1b5361578063c5e1059d8c81a597ee3bcf3779f9e5ebdd00b93fe759babd910a593410213b3a2592109c7a41e1858105b346c8861a0b8f142fdece71444ba6128198f31ec79361b999b493637a1f967e87f9114a0c71f69c197a75ee82d1e32988b6f389e78b29eff7696e188db3c2eb446a232a9af128c64eae88ca3a3f70944b21458a6c55f73c02ab2e76f8aa529f2aef14b6fd4b27b83ef028339e6426c695c7cf55c4f9fa67dd8116961b12e1506541d712743af4fc83f2acba734b35e65aae3b8876fc3a71b900c6764573534453ba5c2e0f2e965c6049450e02a9a873b133c1d7ffabc592578012317ce6a9c700514a6a1dcaa0947eb47caf770b55e86b7a33daf7cdd33a5703df0ea850abf0fc01a337ef51fb0972d076e7a413aa25796a16e6d57b39f2169e2a2cdecdc6d69244e0dc515662698cd5551ec5a7581458e01df131c199eb5d2cc06e1195d5f61a26e10044e8b51800cafa77911d76d8c157295ef2351c3f1fbe4e61ef93c9724d2fd590305e69ed89a6633e0e2cb231ac154a52106b20d9d698b7fafb3a915bd803b8f659a0f6c77f82faa9e75799b29ee57ac3f88a9028ba8dd9655a2a1ba8eebf81b55a1774d86f906d71cb647da8798ac32fb00e6f559c707f16150ebf6353a7faf89dfc746c0e8bf1f1f39f256a3fe11e23554e81e45f42f5893c753e66617b7c26e83157a22ddf3bbb93c97d9c4af70552f139fa727b3714a09830cd332d8119f166e56ef30527cc8db60ee06b6311dbc96ee09d5621b11026be79033792ac498408293e0273ac4208d11cb4c2938d9eb50db02bdf0c2ec3f034041027148c5a78bdfcba2beadd852e9c0f45f1497c7d61640ac9bbb68c4ba00f7f59460f3a510f4ad035d57e0617081f819d23a65e5111ca55f17a8904e845c490326577759c655da07f50b7a50afc45a24d12f4cc227f89bb598f7b13e575c87dd621abb0308634ef26aaa32f7b5b373e53a45fe148684084066c41dea8fa248e4fc2139db45e20d9d5bd04253ab95585a20a849832674d953977183d01ea9b453e505954971b6f7c07bfd5887694ee633cd32d31d14120e3993423437657ce7419e3dd22097a8ce5367d6527f287ecce1628e2680a90eea05628f3cc9d11010a533325bf3feaf7043dfe9f67bf12cf67edb56b54844930cdbb968285ddbfef7be4b414ddf8bc80ae44a99389de3bfc89ed7ba1476751469037112ecaec2d7f47ff42f2ecb36db25f143c8c2d73f0b4b9a4d2b02620268a83c24c74a833f5d6e6573067873aa2672dbe7d50de22adec1da48a469566cd26f78bdc7c78131b921a986838d5cd67673fd35a5a768b76933f559778d50e23bc512e4568f2916aef00b0a1d4347179c7a9719012a51cb626d6bffcd75ef0c5ca41b2ac55bb1f35f4e7e17b0d3c8f8b07445cb8f913e6e84234f8dd36d41790a6ffa5c14caeedd0bf0a0b2a93aee62b5895bb08c590b541bb4b1c936da151ba89fc3bd2eee43e0795ab3269cfdd60a78c630d65b3e5bd91b02675931443e3953878e89d4194f1fc870ecd4f30e77b6c7b876fe875be4170886c172fac1a30e9f57a21bfe0a729766bcabd1afdbb39cd36b4833d39fb57a23c5fb26353cdb5214e50b536ed9c53326ab7f1377ffaab294fc98635f9b7b105128ba8eabd063d4752920ccbac13cf56b2fd44b816a00d24cae12276ba01a6af2ad70ce2e4b637317131fb8ae6a5169af6ec8565d2c9e558f3f226ad4c80fbb1eb8c2356ff25463cceb924fb94faeae047593c367274c34d6549916a5160b865d841f9d54730bc194661d3d8cbde89af661856a38d675b4b7fccaa49f1c70a240f13ae6b0bdb1727b05e01fde66e8bd9cf0a0d2f31220072935eb93ff8289e938d38b6b6020244ae3dc5da26a2b5d059d6ef77cfe7ac5f52123f37bd25b729e05fc4e2fb8001289b5014bb932ceb150fe5a14ff551b694bdcf2cf886e7d22e164582f2a083074b286e8ddd770ad60d58ad8f92d72393b7ad258b4f559dadaf229a576c5c8b0344dbf60a5f09bbd676a080f73fbcc8b6c2bdf6963ca0558a4ecbe09f79e6007df253b402f35140a62f26f72a19fecf9723ea91866d87b75a96ca549abf368cf3f06fdcb53e9b558076d19743bd8ade3ac7ad698d3674dab7a8d7fdebe382ccd942ea44f1260ee2647b4a7f71a932ab149724591abb2e4e57551cefbbb0cf799c8a179dae12133b8332f924bfb482a07d55ded121ee13a20225b2b08e06e58d21e7cbb4450b0ffb185e937a6eb3c4f3928d4bf29a7ed339899e128ececcada3fe3c0552b701846c1288e8ea6bee75a9672d80310b1d8024e12dd05b0234bd97a3701eb90affe66b25dac4c177ecc27ee3afd88b7cf2915cc867bd7f2222a61b0728f0250e2890ea8fa9363168a79d430770c06265f3d5c7fc47ff0c9826ebd7f89fb83817551d477e01b9959eba76a13a4b290838402c4c97486b85a98e6ccb84b8713b47bc5b240a8c008245d13e31371c3f3962eb37520785885c402d7b901b8219407659e387a90d5bd442a3fa23dafd0ccb6767e0108914a6218b538ee8e346095654a4a1d365f14b08742182985ef57d09c35b5f9336341d864816b4a7e6b92397f51d830e8ce36c0bedc57959516e4d1446af5c6fb37d36d57444fbf4b0acd4adc6724ab2c238042be4725a14ff4abcd2fc01f24b763797fb99d6fa51c18edddf320803eeafbbfcda693265e09816047d734af70f0ab967fd772eefc4c292ec9e65a294462d213eadf6f109537b593a2f5dcc4d48136f09fb1363289f6ca3c0d41ef91fc1dc0c2da05c8e77a26cb56ee4309e3df07695463c883f3d7eed62b9b6e6af4a025af0f6fa1881b2ff8331defd8a9c5a08d32d2658efa15d427513124a996ba60ec8a705809cfcf63153d978b07d16ae6ed674eefb4e28a477152eb10fbfb8a8863faf0cd03b8a22250bced78fc3dc5cfb692f45e6c8abad7589ced132485fb1e00a08cc6043d2f4ee6f9323b1ce69f73ab763e157ee6f92529b3bb33e3b5492c1ebfdfda87fa6f00f8bd505ee68f4c1a108df27c0dcb3ecf79e16e76ae50f3c757d6f5b57b01b7678a6a05fffcd46aa0613616c8be14ec087c863ca4a8882450f6d9d34d5b13b2281520e84861c38dc1de53faf0d7aa395088f81abf230e13860d1fc5a75ea880d8fcdecd4ccf19e1d01eeac672fd51a261a128a6f79e3170a62ca3a56be284abd212dc6ed35a8770c126a176f181dbf9db9287357ec261b87eab20a5e8eff8de564b33576783d6f33a356c7b49ea688d4eed00b118f069a5e2d6f90098db5c5cadec23e36e950ec053fcfaa35b65ea856a7de7d091f4c1f00668869b28bb707dce592c808341e80b1b96593650c8ebe63107089d49a0ab2f1a048123823fbe8936c4fa8071aa61b641bd6911f89fb0d8ed356942b5a930ac7269353e79ce15e4c4bec1b20abc645a373aa9bf6a36d64c35c31ca38541c515537e9806d59515aa711f6157810f9e5f2f88da472a81aac2fd32d26bb4af967eb9f56ea6b9380d5b894524b54a8f3232dae9769f7f34be4dace1eaacc07d4f58dcdbceb87d1613bfabe301707e2c4db26141b3138ceec170f80b31a6453d73dbe3933a8c5650a2612181262a3b4b874649a59bb0572f2272c5107740a94715d300fb08368112c1d2a40a43fef422d438bd4c2b6cc91cdf243b7417cf51d999aee5f30c5a54d3711a8d9d9bc7b94bca727d494afc2a22c154952f8a413a1a0c48e79616b13010984efb6e9e93952b1b920c715370e864c9f60a89a01b8c6d34ea2a3cae2625a131e329aa12e24ef36f0053156d839b0478ed4d51abe4e680a7825ad7c76fb3976625332f0557b06be148b0c9acbd75cc9e3ac434da953b3658ca6ddf68a4cf14e0abcbba83215243fba08f37e7eaa47476ccc57ab3ab639b73099aa1ef3c0a70ec25c806e7eaa994d7ffba12e2976681f21c2c222fb61906409ea93b24f07e9090f99618e38a0818cb45aa379e3b63f09a02fa299be54d496f1d43597b330effbffb7f93edc40fb338f5f1fbc18b33e2b52383dca13b9d35937a5550f1974f5dc8a14717e2fb19d94a5ad59779fdec20dd5cad04d31a9a1b04391d9def33dc12f127afd876f1d5111d368e5411609b989dd73c0c2fa783fed0fe68f571ec4c34c167e23e7d1eb08b2d98e714eff98c10269c61118ab4d700e37568e9b0864f1", 0x1000, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000180)=""/34, 0x22) r1 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="00042cbd252418e198ca8d2024df2501000000000000000b000040008c261c4e25977a41aca27220"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) [ 2987.014402] Dev loop0: unable to read RDB block 1 [ 2987.019307] loop0: unable to read partition table [ 2987.085060] loop0: partition table beyond EOD, truncated [ 2987.091240] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:30 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2987.196581] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2987.307453] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2987.339707] Dev loop0: unable to read RDB block 1 [ 2987.358693] loop0: unable to read partition table [ 2987.376985] loop0: partition table beyond EOD, truncated [ 2987.384125] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2987.394361] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:30 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x135}]) 01:04:30 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x800000000000000, 0xfffffffffffffffd) 01:04:30 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042cbd7000fedbdfba87000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) set_mempolicy(0x8003, &(0x7f0000000000)=0x6, 0x5) r3 = msgget(0x1, 0x1) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000500)=""/106) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) r4 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x100000000, 0x80000) write$P9_RWRITE(r4, &(0x7f0000000240)={0xb, 0x77, 0x2, 0xffffffff}, 0xb) 01:04:30 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000240)={0x200, 0x10000, 0xcc5, 0x60, 0xd61, 0xfffffffffffff800}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:30 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:30 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x7, 0x3) [ 2987.528775] Dev loop2: unable to read RDB block 1 [ 2987.534364] loop2: unable to read partition table [ 2987.551313] loop2: partition table beyond EOD, truncated [ 2987.570826] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 2987.581575] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:30 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x3f000000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:30 executing program 3: getpgid(0xffffffffffffffff) fcntl$getown(0xffffffffffffff9c, 0x9) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='@vboxnet1', 0xffffffffffffffff}, 0x30) syz_open_procfs(r0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:30 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:30 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0d0037f44dd0d2ab439fcd93400918350beb3d5dab900711756d0bb10700000035933fd976ca0b2d5a3c71a504eafda41b9848716d7160d16f27663177804075c3c399333837748116621b7a69d237c1020000000000001e78906ebf60004e0e90600510e4c6ad91db76afb0f62072194f403a700a80"], 0x1c}, 0x1, 0x0, 0x0, 0x4000041}, 0x8000) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000240)={'security\x00', 0x5b, "a4434615972e0cd21f8e4aa6d2c7eba2b6e5219c82c8c3c733b8d79a0b5b755602783724f7219539e2c6884a829ae87753b18de4763614c23581eeed6648f7c3a06c9e8ea67cd4d5cdd6a40ae315f1c15c1c0a43e9147925116854"}, &(0x7f0000000000)=0x7f) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2987.711514] Dev loop0: unable to read RDB block 1 [ 2987.716484] loop0: unable to read partition table [ 2987.728986] loop0: partition table beyond EOD, truncated [ 2987.736071] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2987.751755] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:30 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000500)=""/178) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2987.831952] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:31 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 2987.927393] Dev loop0: unable to read RDB block 1 [ 2987.938911] loop0: unable to read partition table [ 2987.987891] loop0: partition table beyond EOD, truncated [ 2988.010889] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2988.028460] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:31 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x136}]) 01:04:31 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="467980580bd63df9fed28cc21d60b3cc94d58f101ea586ac8865c68d8c659af964dcb02c8ae85015c523c62e0e0d0833d73ec5cbb2a7973d452e4a1701bf2345a1a0c9336edec79385c400220b23170054f99e77e28af86f82d48958ad12a9166e6045b2778b93fe7009b1ff83357b1c85", 0x71, 0x2}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r2, @ANYBLOB=',uid=', @ANYRESHEX=r3, @ANYBLOB="2c75a9643d", @ANYRESHEX=r4, @ANYBLOB=',disable_sparse=no,fmask=00000000000000000000000,dont_hash,pcr=00000000000000000042,euid>', @ANYRESDEC=r5, @ANYBLOB="2c736d61636b66736861743d656d312c66736d616769633d3078303030303030303030303030326230622c7375626a5f757365723d73656c696e75785d7b870e2c736d61636b66736861743d5e2c00"]) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:31 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x40000000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:31 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="ca014cee517ad06bdcf9d02b3daa28000000", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000100)={0x2, 0x0, 0xfffffffffffffffd, 0x2000}) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000240)={0x1, 0x5, [{r0, 0x0, 0x10000, 0xfffff000}, {r0, 0x0, 0x1000000009000}, {r0, 0x0, 0x101014000, 0x100000000}, {r0, 0x0, 0xfffffffffffff000, 0x10000}, {r0, 0x0, 0x10000fffff000}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:31 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:31 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000440)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="28804d5394f30fd42a9ae3f3cca60000", @ANYRES16=r2, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r3 = accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000640)=""/40, &(0x7f0000000680)=0x28) getsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f0000000540)={@mcast1, 0x0}, &(0x7f0000000580)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000005c0)={@ipv4={[], [], @empty}, @rand_addr="e0b08a38bbc39ca682dbfaad2afdebd7", @local, 0x5, 0x6, 0x1ff, 0x100, 0xffff, 0x46000000, r6}) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r5, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x1]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x80) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:31 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0xfeffffff) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2988.183380] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2988.241153] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2988.327916] ntfs: (device loop3): parse_options(): Invalid uid option argument: 0xffffffffffffffff 01:04:31 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) capset(&(0x7f0000000240)={0x24020019980330, r2}, &(0x7f0000000000)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:31 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'.yz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:31 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0xfffffffe) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2988.460791] net_ratelimit: 22 callbacks suppressed [ 2988.460799] protocol 88fb is buggy, dev hsr_slave_0 [ 2988.465820] protocol 88fb is buggy, dev hsr_slave_1 01:04:31 executing program 5: syz_open_dev$adsp(0x0, 0x80, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="281000004e783e7cc1a67234897b32ed96ed940e0f82e5e5eacb31", @ANYRES16=r1, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f00000001c0)) [ 2988.552523] Dev loop0: unable to read RDB block 1 [ 2988.557436] loop0: unable to read partition table [ 2988.587472] loop0: partition table beyond EOD, truncated [ 2988.593233] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:31 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20140}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, r1, 0x0, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008800}, 0x4) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f00000001c0)={0x1, 0x0, {0xffffffff80000001, 0x100, 0x6, 0x1}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e20, 0x9, @ipv4={[], [], @empty}, 0x4}, {0xa, 0x4e21, 0x80, @ipv4={[], [], @remote}, 0x1000}, 0x2, [0x3, 0x5, 0x8, 0x400, 0x810000, 0x0, 0x8, 0x1]}, 0x5c) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 2988.663504] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2988.781589] Dev loop0: unable to read RDB block 1 [ 2988.786550] loop0: unable to read partition table [ 2988.830913] loop0: partition table beyond EOD, truncated [ 2988.860720] protocol 88fb is buggy, dev hsr_slave_0 [ 2988.861240] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2988.865847] protocol 88fb is buggy, dev hsr_slave_1 01:04:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x137}]) 01:04:32 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:32 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0xfff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r3, 0xab}, &(0x7f0000000240)=0x8) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:32 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0x8, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:32 executing program 3: fcntl$getown(0xffffffffffffff9c, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='proc\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)) getpid() getpid() r0 = getpgrp(0x0) syz_open_procfs(r0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:32 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x100000000000000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:32 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0xfffff}, 0x0, 0x0, 0xfffffffffffffffe) [ 2989.107268] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:32 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x3f00000000000000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:32 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r3 = getegid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xffffffffffffffd5) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:32 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0x6b6b6b}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:32 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) write$P9_RSYMLINK(r1, &(0x7f0000000000)={0x14, 0x11, 0x1, {0x4, 0x1, 0x5}}, 0x14) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x2010, r1, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:32 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) fanotify_init(0x2, 0x0) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2989.351653] Dev loop0: unable to read RDB block 1 [ 2989.360066] loop0: unable to read partition table [ 2989.380678] audit: type=1400 audit(3872.423:108): avc: denied { map } for pid=24904 comm="syz-executor.5" path="/proc/24904/net/pfkey" dev="proc" ino=4026532859 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1 [ 2989.400853] loop0: partition table beyond EOD, truncated [ 2989.449514] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2989.478666] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2989.510731] protocol 88fb is buggy, dev hsr_slave_0 [ 2989.515868] protocol 88fb is buggy, dev hsr_slave_1 [ 2989.572764] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2989.590429] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2989.660707] protocol 88fb is buggy, dev hsr_slave_0 [ 2989.665813] protocol 88fb is buggy, dev hsr_slave_1 [ 2989.670933] protocol 88fb is buggy, dev hsr_slave_0 [ 2989.675984] protocol 88fb is buggy, dev hsr_slave_1 [ 2989.713777] Dev loop0: unable to read RDB block 1 [ 2989.718710] loop0: unable to read partition table [ 2989.744903] loop0: partition table beyond EOD, truncated [ 2989.755078] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x13c}]) 01:04:32 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0xfeffff}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:32 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:32 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r3 = accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000d00)=0xe8) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0xa, &(0x7f0000000b00)=[{&(0x7f0000000240), 0x0, 0x10000}, {&(0x7f0000000500)="5c3859f78bd8c6227c53556fa7aaa883af2c08381c2f45be953965af98594a7f269db96f56905244f8f62f8b1c95fd394fa7a5550a8b8d128f00fff163b77dbdfc48fbb852efc0a3ca462df273c677c7041e475bb97330be5702f1f128ed1cfb13c3bf63afff325bb74383b09db4935c6bafe1f7ee4204ee4e4f909ddd93ecc3cf61dcdaa49c08458899ce489673da69a5320c012aadcfa9e9257af09da03d59ac96c22df7259893677c1df54f988b3215a8195fad66f392edc5aaa0518dbe9e3c8f629060153dba4ae08197eb8484d86281156371b580", 0xd7, 0x1}, {&(0x7f0000000600)="866ccd3b4364b881390fdf5aed364095b48748232b9728746ffbdaa6c3ed2e4ff840813b66e99d3e890ee5cc5c77e56873dc2ce057aba3c69dac7751970131667acace61bc10620fee96ccbdf02e70653b72391b5a3550071b8affbc92d60ef78faa634c937d8861112ed68008ce76dd4e87f1d9063cecc2d1a0c26587795ca58baaf1437af82180416a1dc883daad527f5717c293e11b8d8ce1be9f20420b813bd7b7bb77f323804050a4fc789a889842bd43", 0xb3, 0x100000001}, {&(0x7f0000000280)="8cde1dc10dbe5c72d9b945d7acba8cddea256a2e746bdbedbb28794f", 0x1c, 0x8af}, {&(0x7f00000006c0)="579ef3db9aac3bf2fc3c3ee81d123331d24b1247764ae16f87f6514d137e24bdd408f934edede86d6e2b984e24bb4c9fb9d8441f69c17e2fd987eba683463d9aef452b5f265a6968f4114d7eda9769832c5c65e027a57dcfaff63c261f58e4b254de", 0x62, 0x8}, {&(0x7f0000000740)="c75af551d4da29fe6ea54ed91309893b760792fb047ce84887455f03f581c20c99953c4d74f82aa22125c29a6e6c02a827385cd0f5b4aabf4bd09115b3e44df317d42f2405293bd6fa7b9728663ed7a382771b33f8d1a6f5d131ea726ed285d8ee2b3cd709ba8a7f5d10817fb192d051a3eddb5105553e053f4dfb912ff3199cc60fffa4958811dda4cd922c769604bd7ecf12128729872f9b506b27acabdda039dbd642ed4265123995e11d9e9b89428cda1b7c09d60392af", 0xb9, 0xdda}, {&(0x7f0000000800)="c1eee7caf0e00a23e2bd96d292e91b36ee6214f9367b063b440154e5acf77c3b3e0f78524208a5d9c619ed562e9eb19f0b9935a5138eecc5f5655fc8b0308d28aba43047346942c5e86508ee14f94d05a9d741a76442d25ed01322e8e329ac4727b08cc50b741f6dd373f15b69cf87c48b46b47a65090ac201247d51cf059e1ec543d1e18a17f67357b3605c9f8b1906959ed0f79d930bdda616fd0a9594b1e8816e6a0bc24f0781f18df8d1416ac4393467b41dd712da99e291e06850597164b8a08d47180b7b3abd62cfb57e24406ca5303f7a55589cef126ee0b3cc41587c6592df4149c27c", 0xe7, 0x7fffffff}, {&(0x7f0000000900)="587ec5f920892db9615def3f86ba2662b4bec619983c51950732d32a8695345ca9cfad443cc99a50fb8e7723af7d0e866462cef0e7f1a4808b6a5e0a11e585d7203872d0f136e33f85010ce9936c87cfb13eca08f125d66310d7d5e7be027ea1a6cf61054f2d9e2fb2d1d27619ad4772c1f577fa80a9613c1f4f43fc70cfcf308e644a7b0b37d445c83cdbe66db64d625bf5c9e1d6cbe932687ef32c480c2cbd77aaf526c0de4adba307c31a23fa806ada6fc7ce6642e2e5f1af9f39809c26adedfd57b39307ae0a77724f056bd7a612ad2d91563ffcd475074f93899088b642596d4a4c92e89d", 0xe7, 0xc4}, {&(0x7f0000000a00)="71ce6c1675d0efc55650458436445c8b753738d4127badefdbcb396658a7fe54f012084456310bac6af32e40e37495786809fdcc59e637e2c4fa4c70f09595d8f232e18be80a5bc7c6919235a17f8f210e8ee9fd8b385ccb2c3648ff44edbcc8c4629e8409", 0x65, 0x5}, {&(0x7f0000000a80)="756d8703d888415db717dcbae1a140de3cfde940908e9952e55a5180ec49a3656035e336d5d6efad7686e4a63e7335f0f3ec0a0e4006b78d83b0109a5fb59309851f5659fb919add70c390df98c8", 0x4e, 0x5}], 0x1000, &(0x7f0000000d40)={[{@disable_sparse_no='disable_sparse=no'}, {@umask={'umask', 0x3d, 0x6}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@uid={'uid', 0x3d, r4}}, {@errors_continue='errors=continue'}, {@errors_remount='errors=remount-ro'}], [{@fsmagic={'fsmagic', 0x3d, 0x5}}]}) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:32 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x3, 0x7, 0x8004, 0x3, 0x200, 0xf551, 0x100, 0x8001, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x80}, &(0x7f0000000240)=0x8) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x82002200}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x58, r3, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4ce}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x40) fcntl$setsig(r2, 0xa, 0x23) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) ioctl(r0, 0x9597, &(0x7f0000000280)="f457e7044542a836fd77faad41c87ef87b2a6be21a306178997846ba213732172aea563aa91c267928928c2f71da55d40932fdee62ff9f7b9479ae82b6da4a") 01:04:32 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x4000000000000000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:32 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0x1000000}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:32 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x80800) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080), &(0x7f0000000240)=0x4) ptrace$cont(0x18, r1, 0xfffffffffffffffe, 0x6) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000280), 0x10) write$FUSE_DIRENT(r0, &(0x7f0000000140)={0xd0, 0x0, 0x7, [{0x5, 0x80000000, 0xf, 0xec, 'wlan1self.eth0['}, {0x0, 0x100000001, 0x0, 0x2}, {0x4, 0x7, 0x16, 0xbc89, '-:/mime_type({&selinux'}, {0x0, 0x7, 0x11, 0x40, 'trusted(+em0}bdev'}, {0x3, 0x2, 0x6, 0x1, 'ppp0lo'}]}, 0xd0) ptrace$cont(0x1f, r1, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_execute_func(&(0x7f0000000040)="c4625d36fac421797e8d00f0a3b8a5c4e27d2a3f0faefcc4016c5d33c4835d4c89e3590000168738440f1e88fb1e00000f812f700000") 01:04:32 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0xfeffffff00000000) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2989.896638] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:33 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0x2000000}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:33 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="28d03a4f0000ea00", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r1 = accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000440)={0x0, 0x0, 0x1ff}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000005c0)={r3}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000240)=""/74) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000)={0x100}, 0x4) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x2fb9, 0x30}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000500)={r4, @in={{0x2, 0x4e23, @rand_addr=0x3}}, 0x5, 0x800}, &(0x7f0000000400)=0x90) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:33 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)={0x0, 0x0, 0xe71}) ioctl$TCFLSH(r0, 0x540b, 0x10000000) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, &(0x7f0000000200)=0x7) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2990.138869] Dev loop0: unable to read RDB block 1 [ 2990.176830] loop0: unable to read partition table [ 2990.231962] loop0: partition table beyond EOD, truncated [ 2990.255779] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2990.302202] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:33 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x151}]) 01:04:33 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000140)={0x1, 0x0, @ioapic={0x2000, 0x9, 0xe1, 0x1e, 0x0, [{0x7, 0x674, 0x5, [], 0x7}, {0x7, 0xffffffffffffffe1, 0x7, [], 0x56}, {0x9, 0x3, 0x8, [], 0x3}, {0x1ff, 0x9, 0x0, [], 0x5}, {0x3, 0x1, 0x7, [], 0x5}, {0x2, 0x87, 0x3, [], 0x8001}, {0x9, 0x0, 0x2, [], 0x9}, {0xa24, 0x5, 0x5998}, {0x20, 0x1, 0x9, [], 0x800}, {0x2, 0x3, 0x401, [], 0x100000000000}, {0x6, 0xc, 0x89, [], 0x32a}, {0x5, 0x0, 0x8001, [], 0x227}, {0xeed, 0xd5, 0x4, [], 0xc90}, {0x10000, 0xda5, 0x4, [], 0xffffffff}, {0xfffffffffffffffa, 0x3, 0x5f, [], 0x1}, {0x6, 0x1, 0xffffffffffffff06, [], 0xb1}, {0x80, 0x401, 0x100000001, [], 0x71057e8c}, {0xea4e, 0x10000, 0x2000000, [], 0x2}, {0x8000, 0xce8f, 0x7f, [], 0x7}, {0xea4, 0x3, 0x6}, {0x5, 0x2, 0x1f, [], 0x4}, {0x8, 0x6, 0x0, [], 0x10000}, {0x9, 0x3, 0x66cb4303}, {0x1, 0x8000, 0x8000, [], 0x3ff}]}}) 01:04:33 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r3 = accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000240)={r1, 0x0, 0x4, 0x6, 0x7}) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:33 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0x6b6b6b00}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:33 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r3, 0x2, &(0x7f0000000240)={0x18, 0x9, 0x4}) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2990.386020] Dev loop0: unable to read RDB block 1 [ 2990.393680] loop0: unable to read partition table [ 2990.405867] loop0: partition table beyond EOD, truncated [ 2990.415383] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:33 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b000000000c001473797a0800000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:33 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) r4 = getpgid(0x0) getpgrp(r4) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:33 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r2, 0x100, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4040) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:33 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0xffff0f00}, 0x0, 0x0, 0xfffffffffffffffe) [ 2990.559227] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:33 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2990.731155] Dev loop0: unable to read RDB block 1 [ 2990.749593] loop0: unable to read partition table 01:04:33 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000000)={0xfffffffffffff388, [0x0, 0x20, 0x0, 0x1, 0x1, 0x3, 0x1, 0x100000000, 0x3, 0x0, 0x0, 0x5, 0x8, 0x3, 0x80, 0x6, 0x7, 0x82, 0x3, 0x3ff, 0x10001, 0x30f, 0x3, 0x81, 0x6, 0x0, 0x0, 0x4e35, 0x6, 0x1f, 0xf8, 0x8, 0x63, 0x0, 0x0, 0x1, 0x2, 0x15a385e6, 0x0, 0x3, 0x71f600000, 0x3ee0, 0x8, 0xfffffffffffffffe, 0x8, 0x2b, 0x7, 0x10001], 0xf}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000140)="87b31ac18b2d23328d2c2ada64e6d5a45385675ce331e716e909aa0328b7310b34437589a4c9339e9417f99d6f5645f0ae8275bfd8d0806acd733580c905c05825eaeb4fd7098f15356b942b1f861a3680874961b43e6bd3203705d64a247347dd7134ebb9d37d6a17296d09ef18ca6c6a3a15f1dd1f771bacc8aa18fce2eda39b1618b23968cd3b466365ef02c65d03b760f5d7afbd2214283748e44134d95b3828cc1e83d1fc0d4897cf843252f17c6a9cfbd19fb94834dac80867228f2e27972cc035a8dddf3add1667c809a06fb7308a591f64d2221097a0eb") ptrace$cont(0x1f, r1, 0x1, 0x0) 01:04:33 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0xfffffe00}, 0x0, 0x0, 0xfffffffffffffffe) [ 2990.793856] loop0: partition table beyond EOD, truncated [ 2990.823923] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2990.907192] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2990.914256] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:34 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x163}]) 01:04:34 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x80, 0x7fffffff}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:34 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB='(\x00L\x00', @ANYRES16=r2, @ANYBLOB="e4032dbd7800fedbdf2501000000f9ffffff14c4274fcfb2f019e3ab6c8c0dffffffff0000000000000000001000000cee0798c6998c024627a1b76daf04a6da78dba7c4ad42572e31550413220f855be4c11fb91798d573753cbd594e3b6f2256f72e2fd098de178b03548db1e96fbbec1e277b510eb4ae63fffd0768234ace503458cb102c4c8c669f457b8cdb773e9519db5193d501d2247411ccd9085277308e604dfa6fdd2ca6d23dd1d4ec07509732bb64"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4401, 0x0) 01:04:34 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADDIR(r0, &(0x7f0000000000)={0x68, 0x29, 0x4, {0x6314, [{{0x80, 0x3, 0x6}, 0x80000000, 0x64, 0x7, './file0'}, {{0x10, 0x4, 0x2}, 0x100000001, 0x9, 0x7, './file0'}, {{0x4, 0x0, 0x8}, 0x9, 0x6, 0x7, './file0'}]}}, 0x68) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:34 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0x6b6b6b00000000}, 0x0, 0x0, 0xfffffffffffffffe) [ 2991.143535] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:34 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) socket$pptp(0x18, 0x1, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:34 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0xfeffff00000000}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:34 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x4021ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = msgget(0x1, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={@default, @default, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x2, r3, r4, r5, r6, 0x40}, 0x10001, 0x76, 0x2, 0xfcdb, 0x8, 0x8, r1, r1}) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2991.289619] Dev loop0: unable to read RDB block 1 [ 2991.295423] loop0: unable to read partition table [ 2991.300474] loop0: partition table beyond EOD, truncated [ 2991.350399] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:34 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b7263000000000c8a2cb734a0f445d192d6aedba51b31797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r1 = accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) capset(&(0x7f0000000040)={0x20071026, r3}, &(0x7f0000000100)={0x0, 0x7fff, 0x0, 0x403}) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000140)) 01:04:34 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100000000}) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:34 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0x100000000000000}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:34 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x27, r0, 0x0, 0xffc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 2991.463781] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2991.517037] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2991.567199] Dev loop0: unable to read RDB block 1 [ 2991.595688] loop0: unable to read partition table [ 2991.626973] loop0: partition table beyond EOD, truncated [ 2991.636028] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2991.662116] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:34 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x164}]) 01:04:34 executing program 3: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r2, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xf}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x200}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc4}, 0x4000040) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$getregs(0xe, r3, 0x5, &(0x7f0000000300)=""/88) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) getpeername$tipc(r1, &(0x7f0000000280)=@id, &(0x7f00000002c0)=0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 01:04:34 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0x200000000000000}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:34 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r1 = accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'gre0\x00'}}) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:34 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0xffffffffffffff1b, 0x20, 0x80000000}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) fcntl$getownex(r3, 0x10, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2991.932112] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2991.940843] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:35 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000002c0)=r3, 0x4) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:35 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f00000001c0)='attr/fscreate\x00') r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x40, r3, 0x724, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) write$cgroup_pid(r0, &(0x7f0000000200)=r1, 0x12) [ 2992.072584] Dev loop0: unable to read RDB block 1 [ 2992.077694] loop0: unable to read partition table [ 2992.084038] loop0: partition table beyond EOD, truncated [ 2992.089590] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:35 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2, 0xffff0f0000000000}, 0x0, 0x0, 0xfffffffffffffffe) 01:04:35 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept(r1, 0x0, &(0x7f0000000000)) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:35 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000001c0)=0xc) setpriority(0x2, r3, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2992.151694] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:35 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000808}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x32c, 0x39, 0xe10, 0x70bd28, 0x25dfdbfb, {0x1}, [@nested={0xcc, 0x15, [@generic="d5ef949cc2643546f123e2c8f85384bf51560bdeb73aeb4e9ae415dba6efd7d5fafb75442a13ae788411d6b89c07cf1b9252f5433bf33a9ddac67b1eddd7e85d595487bf6d656ddc841887180cd4d96c67e6e5a1f564f5d964913a14bd825ab4d2cd82766395235faf7813d64c40b0baa2c6dd9871b34837e7", @typed={0x2c, 0x6c, @str='{trustedvmnet0cpuset-{\'].@+(vboxnet0-\x00'}, @typed={0x4, 0x92}, @typed={0x14, 0x6b, @ipv6=@mcast1}, @typed={0x8, 0x26, @pid=r1}]}, @generic="2ff63290a0f0f28d4a57b22fdedc51e7b0d5b045749c8e6df7e13ccc51a6bea3eff2d7515581f2411339e81ddadd26c4f2cc583c9c33330ddba73f890d071ee0282296c310df773f528e7d1332e5f156778494382b23929d64223e53ac0a05e8d951cbcf7679559802dd77bb46bf12f8cc74b5140ae056dbf6ac6e404d79dc67e7605f", @generic="003ff4960f42530faa0d541758e9fc615cbae6b019cd03b1f2f4dd4291c4a9888e3863f064ebca97ef711d86284092282cf3d0b26c421fcf4b0860262aca3e18277bf91ce52345361aa51b2deb207b84c55afe89bd7da3e123d45f74f673a8b33a875b02db4f088e831017093686fea2025e", @nested={0x28, 0x54, [@typed={0x24, 0x70, @binary="ecb1947b9c2504e7decca90f847e8191770eb9db9e61aa0b1442ec97422e38"}]}, @nested={0x64, 0x88, [@generic="8c97f2ffd0fb7fa058e4a08964d9c51f68993ed338873424cf542113ebd23440a1026faf1cda63329136f40e39ebb334483bf96775c7bcfba47d6f9f62523e30244dd672a26449b0cd458c21e8cf500945cc602739b66b", @typed={0x8, 0x78, @ipv4=@multicast2}]}, @nested={0xc8, 0x84, [@generic="f085a0b8c10f6f958708e47cc9d63db6df09a86ed7ce77dbb0ffff8d9acf55cbf35b2ba32575c80d106b337d1c555dad203702b97459edfa6e97de19e8baae02d054ef22d48e013bd30b196682bf435bd4bf5fe335c34c5957ab4c73a867874fdd565e8dd7a13d0f2a4ad0e220c1d7dbfb4553a4b3f1bcc64d2493bd4d543766e4a53891f06bc1cfae8a6f52a4692afe71b2fba46755781887ae90d2aad9d83b5e3c7370c77fe0abb949e3568ff9210775dbdaecc83506c82825165d9f78c51bb0"]}]}, 0x32c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0x22, r1, 0x2d, &(0x7f00000007c0)="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") ptrace$cont(0x1f, r1, 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000500)=ANY=[@ANYBLOB="1a2b387360a7000b2c96debdb24a218df7165ddff3e8c6842d1b79c2038a7b792fd40ca5dd95cd0fa66a6ae3dc71c4e3202c3d2ac8be8cceaeb7a92b46590b760209a2546f15d423037d2de2c692b94d2f40345c2edb4db0ffab5fe0f4324205d7ebf71434f9"]) [ 2992.218902] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:35 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x2, 0xfffffffffffffffe) [ 2992.331284] Dev loop0: unable to read RDB block 1 [ 2992.336238] loop0: unable to read partition table [ 2992.387306] loop0: partition table beyond EOD, truncated [ 2992.389219] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2992.395578] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2992.511200] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:35 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x1fc}]) 01:04:35 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)={0x0, 0xfffffffffffffffe}) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000000)={0x5, 0x7}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000100)=0x1) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000180)) 01:04:35 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x803f, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:35 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0xf, 0x74, 0x1, 0x80000}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:35 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0xfffff, 0xfffffffffffffffe) [ 2992.647705] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:35 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:35 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x6b6b6b, 0xfffffffffffffffe) 01:04:35 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x4, 0x0) ioctl$TIOCSBRK(r0, 0x5427) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2992.759043] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2992.791617] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:35 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004fe255afc13003d89b8ce6fa72cbd7000fedbdf0100000000000000000b000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:35 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000240)={0x7f, 0x1, 0xfffffffffffffffb, {r3, r4+30000000}, 0x5b9, 0x8}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:35 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="5b41efd2", @ANYRES16=r2, @ANYBLOB="00042bbd7000fedbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:36 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0xfeffff, 0xfffffffffffffffe) [ 2992.992534] Dev loop0: unable to read RDB block 1 [ 2992.997476] loop0: unable to read partition table [ 2993.081074] loop0: partition table beyond EOD, truncated [ 2993.104929] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2993.162794] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:36 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0xfffffffffffffc00, 0x1000, 0x9}) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) r1 = msgget$private(0x0, 0x11a) msgrcv(r1, &(0x7f0000000040)={0x0, ""/54}, 0x3e, 0x0, 0x3800) 01:04:36 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000000)=""/163) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:36 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x400000010001, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:36 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x1000000, 0xfffffffffffffffe) 01:04:36 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0xa00, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) [ 2993.270078] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2993.357736] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 01:04:36 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x2000000, 0xfffffffffffffffe) 01:04:36 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4094, 0x400200) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000140)=""/108) r1 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x800, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000000)) [ 2993.452571] Dev loop0: unable to read RDB block 1 [ 2993.490450] loop0: unable to read partition table [ 2993.500883] loop0: partition table beyond EOD, truncated [ 2993.507640] Dev loop2: unable to read RDB block 1 [ 2993.513441] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:36 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="00000000ac41d9e57c1723ff0f08ce6744b7a6b6625ab45166ee461e5c8308a68713e9a444176f54c69919", @ANYRES16=r2, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) r3 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x10040, 0x0) write(r3, &(0x7f0000000000)="631baecd1c5d0a39a66b5a6ba95b9745a56377d19ab6ce7ff2a3b66726a319564363cfb17f516fe6e5fbac0c7453bd34f3174df1d0", 0x35) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:36 executing program 4: syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="289107994520e92d6b197edd77de000000", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000240)) [ 2993.548128] loop2: unable to read partition table [ 2993.563902] loop2: partition table beyond EOD, truncated [ 2993.586064] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 01:04:36 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x6b6b6b00, 0xfffffffffffffffe) [ 2993.636410] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2993.660716] net_ratelimit: 18 callbacks suppressed [ 2993.660724] protocol 88fb is buggy, dev hsr_slave_0 [ 2993.670802] protocol 88fb is buggy, dev hsr_slave_1 01:04:36 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000280)={'ip6gre0\x00', {0x2, 0x4e22, @remote}}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:36 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000380)={{0x2221, 0x6}, 0x1, 0xc24e, 0x7, {0x81, 0xfffffffffffffffa}, 0x7, 0x6}) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)="9dac9979b63446611c7ff41220d5f666e96728f8633b04022c488e4682f485f1403003c4c2ffcfddce9e6ef5e9a08af0a5998e38f534719095e727782755ff8488f1626686", 0x45) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x13c, r2, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb4da}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x181b04f5}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xcf5c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40001}, 0x20000011) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:36 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x200, 0x4) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000001c0)={0x5, 0x3, [{0x4, 0x0, 0xffffffffffffffa9}, {0x50, 0x0, 0x7ff}, {0x7fff, 0x0, 0x800}, {0x3, 0x0, 0x813}, {0x58, 0x0, 0xffe000}]}) close(r0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x159) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000380)={&(0x7f0000000280)=""/227, 0x1000, 0x0, 0x401}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x4, 0x30, 0x5, 0x8}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r3, 0x1}, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000) [ 2993.791599] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2993.831425] protocol 88fb is buggy, dev hsr_slave_0 [ 2993.836508] protocol 88fb is buggy, dev hsr_slave_1 01:04:36 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0xffff0f00, 0xfffffffffffffffe) [ 2993.841651] protocol 88fb is buggy, dev hsr_slave_0 [ 2993.846708] protocol 88fb is buggy, dev hsr_slave_1 01:04:36 executing program 3: r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x1f, r1, 0x10001, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x2, 0x4) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:36 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x10940, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', r2}) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:37 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x5, {0x5}}, 0x18) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x200000000002, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) [ 2993.937070] audit: type=1804 audit(3876.983:109): pid=27765 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir093261987/syzkaller.uoNqUq/2684/file0" dev="sda1" ino=17157 res=1 01:04:37 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r3 = accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fremovexattr(r4, &(0x7f0000000280)=@random={'os2.', ']\\trusted:\x00'}) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x95d}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000240)={r5, 0x4}, 0x8) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:37 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(r1, r0, 0x80000) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x10000) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) 01:04:37 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0xfffffe00, 0xfffffffffffffffe) 01:04:37 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x800) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6, @link_local}, 0x10) r2 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() prctl$PR_GET_TIMERSLACK(0x1e) wait4(r3, 0x0, 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000040)={0xea, 0xdf58, 0xa60}) [ 2994.140718] protocol 88fb is buggy, dev hsr_slave_0 [ 2994.145836] protocol 88fb is buggy, dev hsr_slave_1 01:04:37 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/183, 0xb7) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) set_robust_list(&(0x7f0000000540)={&(0x7f0000000180)={&(0x7f0000000100)}, 0xfffffffffffffffc, &(0x7f0000000500)={&(0x7f0000000400)}}, 0x18) 01:04:37 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x6b6b6b00000000, 0xfffffffffffffffe) 01:04:37 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) r3 = accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={0x0, 0xe9}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000002c0)={r5, 0xb5d5, 0x5, 0x3}, &(0x7f00000005c0)=0x10) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$KVM_INTERRUPT(r6, 0x4004ae86, &(0x7f0000000000)) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000500)={[0x7, 0x2, 0x3, 0x200, 0x7ff, 0x0, 0x6, 0x0, 0x4, 0xffffffffffffff20, 0x8001, 0x1, 0x4000000004, 0x9, 0x5, 0xfffffffffffffb1e], 0x10000, 0x80}) 01:04:37 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x8}, 0x1) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000240)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) ptrace$setregset(0x4205, r1, 0x6, &(0x7f0000000080)={&(0x7f0000000140)="fce24b7a3d4d4973f5d66decaf900b22b1f9275bae1d41b2bf672fa5c5d3649bf650a19357e6f7dcc77faf243eb2ad2da964afefc0072f812997b0e160c251f10c9e6f47e43b473dc4b263afb8f0d77b95c458c3688a96c2283a88", 0x5b}) ptrace$cont(0x1f, 0x0, 0x0, 0x0) [ 2994.361675] Dev loop0: unable to read RDB block 1 [ 2994.366587] loop0: unable to read partition table [ 2994.415548] loop0: partition table beyond EOD, truncated [ 2994.422726] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2994.451164] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2994.503458] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 01:04:37 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0xfeffff00000000, 0xfffffffffffffffe) [ 2994.547959] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2994.630403] Dev loop0: unable to read RDB block 1 01:04:37 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4200, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:37 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getpgid(0x0) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) getdents64(r1, &(0x7f0000000140)=""/69, 0x45) modify_ldt$write(0x1, &(0x7f00000001c0)={0x7ff, 0x20000000, 0x0, 0x800, 0x81, 0x0, 0x6, 0xfff, 0x4, 0x3ff}, 0x10) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xb, r2, 0x6, &(0x7f0000000200)="8c7c3a5f18db0805efa4449101832e2880a5272b6735891e46905360b60b76a8f84fe760832bc12d38aef6f0037ecb60047505a031470926e65a40017e6d19009e793174a6c8d14a1b0227042a85a44be240a30cde3165e43158d61ef508873e27989958093bcf40cae818feceaaee729ed1b0321d9d1965db7da6a8e466") ptrace$cont(0x1f, r2, 0x0, 0x0) 01:04:37 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000240)={@initdev, 0x0}, &(0x7f0000000280)=0x14) bind$bt_hci(r0, &(0x7f00000002c0)={0x1f, r3, 0x1}, 0xc) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00041cbd7000fedb000001000000000000000b000000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000500)={0x29c, 0x3f, 0x8, 0x9}, 0x10) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:37 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x4114}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r3, 0x2, 0x5}, 0xc) [ 2994.700764] protocol 88fb is buggy, dev hsr_slave_0 [ 2994.701379] loop0: unable to read partition table [ 2994.705847] protocol 88fb is buggy, dev hsr_slave_1 [ 2994.801008] loop0: partition table beyond EOD, truncated [ 2994.836046] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 01:04:37 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x96, 0x133}]) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8001, 0x200000) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000240)={@ipv4={[], [], @dev}}, &(0x7f0000000280)=0x14) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0xa00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xffffffff, 0xfffffffffffffffd, 0x0, 0x9}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x4000000) 01:04:37 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x100000000000000, 0xfffffffffffffffe) 01:04:37 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:38 executing program 3: r0 = syz_open_procfs(0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x20) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mq_notify(r0, &(0x7f0000000000)={0x0, 0x10, 0x0, @tid=r1}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x100000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x5, &(0x7f00000023c0)=[{&(0x7f0000000280)="db662b614a556967cf8d3425b7543f76f9b71ca027073eddafaeeb26167df9c924d5693a920df223e930c779cbd966e59b3d7e8d21e0811af5d7feadf8000cb98d1ae0f61c6d68047c2e8cf31d2729f564020c", 0x53, 0xffff}, {&(0x7f0000000300)="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", 0x1000, 0x8}, {&(0x7f0000001300)="cfe1af263f5799715b792b95594bd6165a4c68a40c3aa8ccb0b0634b8f7e38cb375826de056759c9f70aeb23cea6eb684723aae4867d3806ce9c430b325dcf11316981db27cb59f9677b0cbf7d806cf994035871dd132f8125152dee7571f44e308631c13ff238fdfb892ee9a6a979d594c99b634fa5ac3d2253ba17b75e5896b6e533da414b69f73d09336c42b2e08df048ff6f93589c4ff97c403cfa3e48948f0e92779f595eecac4de767a07691dacf994f371d7b67eeb646c93cc3", 0xbd, 0x2}, {&(0x7f00000013c0)="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", 0x1000, 0xbe}, {&(0x7f0000000100)="3aca6ebb3b88d5de009053898dbd1a71316aa715cb078144f58b89561e534c797f2a0e884a06c28117de9549085173ecf561066d7c7da07c1f77a8", 0x3b, 0x2f2011e3}], 0x20000, &(0x7f0000002440)={[{@usrjquota={'usrjquota'}}, {@whint_mode_off='whint_mode=off'}, {@disable_roll_forward='disable_roll_forward'}, {@nobarrier='nobarrier'}], [{@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'eth1'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x37, 0x73, 0x77, 0x0, 0x77, 0x33, 0x64], 0x2d, [0x77, 0x0, 0x0, 0x66], 0x2d, [0x36, 0x76, 0x65, 0x66], 0x2d, [0x32, 0x7f, 0x64, 0x71], 0x2d, [0x0, 0x66, 0x64, 0x71, 0x34, 0x30, 0x75]}}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'posix_acl_access*[$wlan0trustedsystem*mime_type,K[securityem0vmnet1'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x35, 0x62, 0x32, 0x36, 0x36, 0x35, 0x61], 0x2d, [0x77, 0x66, 0x7f, 0x67], 0x2d, [0x64, 0x77, 0x0, 0x31], 0x2d, [0x77, 0x38, 0x0, 0x75], 0x2d, [0x66, 0x0, 0x66, 0x0, 0x37, 0x35, 0x0, 0x63]}}}]}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000140)={[0x80000000, 0x5, 0x5, 0x40000000000, 0xfff, 0xff, 0x7, 0x6, 0x7f, 0x17b5, 0x0, 0x6, 0x7f, 0x5, 0x3f, 0x100], 0xf006, 0x1}) ptrace$cont(0x1f, r1, 0x0, 0x0) 01:04:38 executing program 4: r0 = syz_open_dev$adsp(0x0, 0x80, 0x80000) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000100)=0x6) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) write$tun(r0, &(0x7f0000000500)={@val={0x0, 0xe8fb}, @val={0x1, 0x1, 0x7f, 0x7, 0x6b4b, 0xca0}, @ipx={0xffff, 0xce, 0x100000001, 0x5, {@current, @random="0b92be7ccba4", 0x7fffffff}, {@current, @current, 0xfffffffffffffeff}, "46133d670b595f521cb727442f3b6edad9867a63c31475c8fa70393895f32512f1e03620ce3f662eb5e9ff7807b46f6fbf3a26f97a09fc3d31223c2c59c0537d6e51e56eaa7b023ed0b3cc40984229c9d408e7e27d1a14a614ea5f95b549a2a4d5391c08e2a9aa04192ba07c6a19f0488f779d5a1fe6d6c55cc949fb8dcce966eeeb9ba5e98c4079267ba330a1be72ceb476805df2515df50ebb952de033895ef2444c8790045a154c9e1dbd94643b90"}}, 0xdc) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) 01:04:38 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x200000000000000, 0xfffffffffffffffe) [ 2995.114926] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:38 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0xffff0f0000000000, 0xfffffffffffffffe) [ 2995.161633] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2995.245258] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2995.331724] Dev loop0: unable to read RDB block 1 [ 2995.366759] loop0: unable to read partition table 01:04:38 executing program 3: syz_open_procfs(0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) waitid(0x2, r0, &(0x7f0000000000), 0x2, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r2, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:04:38 executing program 1: request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000001c0)={0x3ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, [], [], [], 0x5, 0xffd}) [ 2995.392284] loop0: partition table beyond EOD, truncated [ 2995.400724] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2995.412041] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) 01:04:38 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x80000) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8040, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0002020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000040) accept(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000380)=0x74d85850281ee354) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x153}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x0) request_key(&(0x7f0000000c40)='encrypted\x00', &(0x7f0000000c80)={'syz', 0x2}, &(0x7f0000000cc0)='cgroup.threads\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000001400)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad60474ffb468fd346a0a23a3d0b65e52743e14676cf4f353", 0xad, 0x136}]) 01:04:38 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x59, 0x1, &(0x7f00000017c0)=[{&(0x7f00000001c0)="2a416fb81d784571693fb1dc058b0d291f4acdf96d57ba7bd1ae759dfb9e9845d01f419e68f3bffd01787857817cc66175355fdd3281f90281a1b5be268add48f6c5044d3a1860f4e03f0796b678a2a2054cad8adf3b690bb2a2511ba6368a7e81b3271f807572f30d89a8dd466515642909150cb253c1925a1a7af018ffff02dd5fabe7958e694ca87ff927b1f4f4d380e7c4b57ad6", 0x7, 0x800000}]) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200241, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000040)={0x1, 0x200, 0x7ff, 0xffffffffffffffe0, 0x18, 0x4}) [ 2995.583679] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2995.663165] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2995.873225] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 2995.922791] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2996.001657] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2996.111854] device bridge_slave_1 left promiscuous mode [ 2996.117377] bridge0: port 2(bridge_slave_1) entered disabled state [ 2996.124161] loop_reread_partitions: partition scan of loop2 () failed (rc=-13) [ 2996.201104] device bridge_slave_0 left promiscuous mode [ 2996.206608] bridge0: port 1(bridge_slave_0) entered disabled state [ 2996.271686] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 2996.405611] device hsr_slave_1 left promiscuous mode [ 2996.486172] device hsr_slave_0 left promiscuous mode [ 2996.523767] team0 (unregistering): Port device team_slave_1 removed [ 2996.535843] team0 (unregistering): Port device team_slave_0 removed [ 2996.546590] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2996.584629] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2996.674633] bond0 (unregistering): Released all slaves [ 2996.847913] WARNING: CPU: 1 PID: 8137 at net/batman-adv/multicast.c:371 batadv_mcast_mla_update+0x1927/0x1ec0 [ 2996.858078] Kernel panic - not syncing: panic_on_warn set ... [ 2996.863955] CPU: 1 PID: 8137 Comm: kworker/u4:5 Not tainted 5.0.0-rc8+ #3 [ 2996.870861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2996.880205] Workqueue: bat_events batadv_mcast_mla_update [ 2996.885725] Call Trace: [ 2996.888358] dump_stack+0x172/0x1f0 [ 2996.891979] ? batadv_mcast_mla_update+0x1830/0x1ec0 [ 2996.897121] panic+0x2cb/0x65c [ 2996.900303] ? __warn_printk+0xf3/0xf3 [ 2996.904177] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 2996.909271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2996.914793] ? __warn.cold+0x5/0x45 [ 2996.918426] ? __warn+0xe8/0x1d0 [ 2996.921780] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 2996.926869] __warn.cold+0x20/0x45 [ 2996.930394] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 2996.935484] report_bug+0x263/0x2b0 [ 2996.939140] do_error_trap+0x11b/0x200 [ 2996.943040] do_invalid_op+0x37/0x50 [ 2996.946741] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 2996.951826] invalid_op+0x14/0x20 [ 2996.955263] RIP: 0010:batadv_mcast_mla_update+0x1927/0x1ec0 [ 2996.960960] Code: 00 0f 85 95 05 00 00 4c 3b ad d0 fe ff ff 4c 89 ef 4d 8b 65 00 0f 85 a0 fb ff ff e8 33 24 89 fa e9 a6 ef ff ff e8 29 24 89 fa <0f> 0b e9 64 ec ff ff e8 1d 24 89 fa 8b b5 a8 fe ff ff 31 ff e8 90 [ 2996.979849] RSP: 0018:ffff888056d87bc0 EFLAGS: 00010293 [ 2996.985225] RAX: ffff888056d7c380 RBX: 0000000000000001 RCX: ffffffff86e6a759 [ 2996.992477] RDX: 0000000000000000 RSI: ffffffff86e6baf7 RDI: 0000000000000007 [ 2996.999730] RBP: ffff888056d87d30 R08: ffff888056d7c380 R09: ffff888056d7cc48 [ 2997.007416] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888056d87c98 [ 2997.014668] R13: ffff8880955eddd0 R14: 0000000000000000 R15: ffff888056d87d08 [ 2997.021933] ? batadv_mcast_mla_update+0x589/0x1ec0 [ 2997.026937] ? batadv_mcast_mla_update+0x1927/0x1ec0 [ 2997.032031] ? kasan_check_read+0x10/0x20 [ 2997.036167] ? batadv_mcast_querier_log.isra.0+0x140/0x140 [ 2997.041781] ? check_preemption_disabled+0x48/0x290 [ 2997.046786] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2997.052225] process_one_work+0x98e/0x1790 [ 2997.056451] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2997.061106] ? lock_acquire+0x16f/0x3f0 [ 2997.065068] worker_thread+0x98/0xe40 [ 2997.068854] ? trace_hardirqs_on+0x67/0x230 [ 2997.073164] kthread+0x357/0x430 [ 2997.076515] ? process_one_work+0x1790/0x1790 [ 2997.081001] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2997.086533] ret_from_fork+0x3a/0x50 [ 2997.091518] Kernel Offset: disabled [ 2997.095235] Rebooting in 86400 seconds..