0)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1464.898302] Dev loop0: unable to read RDB block 6 [ 1464.903398] loop0: unable to read partition table [ 1464.925983] loop0: partition table beyond EOD, truncated [ 1464.942210] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1465.026982] FAT-fs (loop2): bogus number of reserved sectors [ 1465.043488] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1465.092842] FAT-fs (loop2): bogus number of reserved sectors [ 1465.098846] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:48 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x80000, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000280)={0xa65, 0x1}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x30000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x2, {{0x6, 0x2, 0x9, 0x8000, 0x2, 0x4, {0x6, 0x2, 0xffffffff, 0xffffffff, 0x4, 0x2, 0x8, 0x2000000000000000, 0x7, 0xd5, 0x2, r3, r4, 0x3, 0x7fff}}, {0x0, 0x6}}}, 0xa0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f00000000c0)={0x1, 0x7, 0xffffffffffffffff}) 17:19:48 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007507000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:19:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 1465.682405] FAT-fs (loop2): bogus number of reserved sectors [ 1465.709120] Dev loop0: unable to read RDB block 6 [ 1465.714142] loop0: unable to read partition table 17:19:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) recvmmsg(r0, &(0x7f0000002e00)=[{{&(0x7f0000000200)=@nl=@proc, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/9, 0x9}], 0x1}, 0x3}, {{&(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/94, 0x5e}, {&(0x7f0000001400)=""/217, 0xd9}, {&(0x7f0000001500)=""/217, 0xd9}, {&(0x7f0000001600)=""/228, 0xe4}], 0x5, &(0x7f0000001780)=""/4096, 0x1000}, 0xfffffffffffffffa}, {{&(0x7f0000002780)=@ll, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002800)=""/106, 0x6a}, {&(0x7f0000002880)=""/209, 0xd1}, {&(0x7f0000002980)=""/252, 0xfc}, {&(0x7f0000002a80)=""/203, 0xcb}, {&(0x7f0000002b80)=""/204, 0xcc}, {&(0x7f0000000280)=""/33, 0x21}], 0x6, &(0x7f0000002d00)=""/235, 0xeb}, 0x8}], 0x3, 0x10000, &(0x7f0000002ec0)={0x77359400}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) [ 1465.737440] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1465.740562] loop0: partition table beyond EOD, truncated [ 1465.769675] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1465.807152] FAT-fs (loop2): bogus number of reserved sectors [ 1465.814074] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x300}]}]}, 0x20}}, 0x0) 17:19:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5d04000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1465.898248] Dev loop0: unable to read RDB block 6 [ 1465.903241] loop0: unable to read partition table [ 1465.924047] loop0: partition table beyond EOD, truncated [ 1465.942510] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000040)={{0x5, 0xc84c}, {0x81, 0x3f}, 0xfffffffffffffffe, 0x4, 0x2}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYRES16=r2, @ANYBLOB="010000000000000000001400000004000700"], 0x3}}, 0x0) 17:19:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x300}]}]}, 0x20}}, 0x0) 17:19:49 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000a607000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x300}]}]}, 0x20}}, 0x0) 17:19:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x14, r1, 0x20, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20044001}, 0x810) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r2, 0x310, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3f}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}]}, 0x34}, 0x1, 0x0, 0x0, 0x50}, 0x800) [ 1466.738326] Dev loop0: unable to read RDB block 6 [ 1466.743245] loop0: unable to read partition table [ 1466.777417] loop0: partition table beyond EOD, truncated [ 1466.782903] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1100000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x300}]}]}, 0x20}}, 0x0) 17:19:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1466.938393] Dev loop0: unable to read RDB block 6 [ 1466.944789] loop0: unable to read partition table [ 1466.971821] loop0: partition table beyond EOD, truncated [ 1466.991452] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x3, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="07000080", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x20) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:50 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000d307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x300}]}]}, 0x20}}, 0x0) 17:19:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x802, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000040)={0x9, 0xffffffffffffff81, 0x8, 0x81, 0x7, 0x101, 0x1, 0x5, 0xffffffffffffffbb, 0x81}) 17:19:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x300}]}]}, 0x20}}, 0x0) [ 1467.698509] Dev loop0: unable to read RDB block 6 [ 1467.704034] loop0: unable to read partition table [ 1467.727356] loop0: partition table beyond EOD, truncated 17:19:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1467.742250] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1467.858117] Dev loop0: unable to read RDB block 6 [ 1467.869657] loop0: unable to read partition table [ 1467.880397] FAT-fs (loop2): bogus number of reserved sectors [ 1467.885301] loop0: partition table beyond EOD, truncated [ 1467.892179] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1467.907820] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1467.980271] FAT-fs (loop2): bogus number of reserved sectors [ 1467.986095] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000040", @ANYRES16=r1, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) 17:19:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 17:19:51 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000003907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:51 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0x101200) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x2b) 17:19:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1468.668971] Dev loop0: unable to read RDB block 6 [ 1468.684106] loop0: unable to read partition table 17:19:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1e000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1468.722516] loop0: partition table beyond EOD, truncated [ 1468.738468] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000300)) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000000c0)={0x3, 0x100000001, 0x3, 0x0, 0x2, 0x800, 0x1, 0x26, 0x0, 0x835, 0x8e92, 0x0, 0x0, 0x2, 0x80, 0x8, 0xffff, 0x4, 0x8}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="010000000000000400001400000004000700"], 0x18}}, 0x0) [ 1468.816256] FAT-fs (loop2): bogus number of reserved sectors [ 1468.838646] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1468.849247] Dev loop0: unable to read RDB block 6 [ 1468.854317] loop0: unable to read partition table [ 1468.869045] loop0: partition table beyond EOD, truncated [ 1468.883567] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1468.907805] FAT-fs (loop2): bogus number of reserved sectors [ 1468.913799] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000000c0)={0x4, 0xfffffffffffffffb, 0x5, [], &(0x7f0000000080)={0x0, 0x8b2, [], @p_u16=&(0x7f0000000040)=0xa8}}) 17:19:52 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000a807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="18006a4ecfaed07d6a3f9f5e20af2af2390000", @ANYRES16=r1, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) 17:19:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1469.618508] Dev loop0: unable to read RDB block 6 [ 1469.636212] loop0: unable to read partition table 17:19:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:19:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1226, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x20000) accept4$unix(r2, 0x0, &(0x7f0000000040), 0x80000) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfc, 0x10000000}, 0xfffffffffffffe1e) [ 1469.660911] loop0: partition table beyond EOD, truncated [ 1469.680353] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1469.809563] Dev loop0: unable to read RDB block 6 [ 1469.815043] loop0: unable to read partition table [ 1469.832066] loop0: partition table beyond EOD, truncated [ 1469.842394] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:19:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = gettid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x0, 0x0, 0xfffffffffffffffa, 0x9, 0x5, 0x926, 0xb1b}, 0x0) sched_getattr(r2, &(0x7f0000000000), 0x30, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x4000, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x7, 0x200000) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000200)=0x0) kcmp(r2, r4, 0x0, r0, r0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f5}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)=0x3) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x28000, 0x0) tee(r5, r0, 0x217c000, 0x7) 17:19:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5d04, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:53 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000ad07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lstat(&(0x7f0000000680)='./file0\x00', 0x0) lstat(&(0x7f0000000940)='./file0\x00', 0x0) lstat(&(0x7f0000000ac0)='./file0\x00', 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f0000000080)={0x7, "16b6066274df4e298963d13312ac7ee59633a63068610a5a57125672156f993e", 0x1, 0x20, 0x0, 0x80000001, 0x5, 0x0, 0x200, 0x81}) read$FUSE(r1, &(0x7f00000040c0), 0xffffffc8) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1470.589668] Dev loop0: unable to read RDB block 6 [ 1470.598276] loop0: unable to read partition table 17:19:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1470.631928] loop0: partition table beyond EOD, truncated [ 1470.645232] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xa4) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, 0x0) 17:19:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x45e, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1470.788707] Dev loop0: unable to read RDB block 6 [ 1470.793851] loop0: unable to read partition table [ 1470.819157] loop0: partition table beyond EOD, truncated [ 1470.840104] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1470.868927] FAT-fs (loop2): bogus number of reserved sectors [ 1470.882725] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1470.975478] FAT-fs (loop2): bogus number of reserved sectors [ 1470.986448] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) 17:19:54 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x5854}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r1, 0x1, 0x8001}, &(0x7f00000000c0)=0xc) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000240)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x3b8, r2, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8a2}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0x150, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc5f6}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x8, @remote, 0x6159}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x8, @mcast1, 0x800}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @mcast2, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7f, @dev={0xfe, 0x80, [], 0xc}, 0x3ff}}}}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0x120, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffa800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5d7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @loopback, 0x82}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x60, @local, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1800000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9d1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}]}, 0x3b8}}, 0x4000000) r3 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x6, 0x80000) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x10, r3, 0x180000000) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="18211dca61ebbe2865a3fbfc0a271697f9c1536638c93df1e09f5a49ff1b0715c18b19595a51", @ANYRES16=r2, @ANYBLOB="01000000000007000009000000fff3640700"], 0x18}}, 0x0) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 17:19:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) 17:19:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xd00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1471.579507] Dev loop0: unable to read RDB block 6 [ 1471.584566] loop0: unable to read partition table [ 1471.594318] loop0: partition table beyond EOD, truncated [ 1471.600628] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 17:19:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1471.707467] Dev loop0: unable to read RDB block 6 [ 1471.712664] loop0: unable to read partition table [ 1471.726942] loop0: partition table beyond EOD, truncated [ 1471.743343] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000014000000040007007ce09743176d2821da953742d152c7985854f195dd416d0f9a8ed2db4d537f397f4df2fb46900fe75033f5ab93404e1bbea9f09e1cf7ee02d6"], 0x18}}, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffffffff2cfe, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x100, 0x0, 0x3, 0x61270ead}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={r3, 0x907, 0x3, 0x8, 0x8, 0x5}, &(0x7f0000000280)=0x14) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000180)) [ 1471.784795] kauditd_printk_skb: 148 callbacks suppressed [ 1471.784811] audit: type=1400 audit(1544807994.351:468): avc: denied { map } for pid=27482 comm="syz-executor1" path="/dev/adsp6" dev="devtmpfs" ino=502636 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:device_t:s0 tclass=file permissive=1 17:19:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:54 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000fc07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5904000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xffffff9e) 17:19:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) 17:19:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = semget$private(0x0, 0x1, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f00000004c0)={{0x4, r3, r4, r5, r6, 0xa4, 0x5}, 0x3, 0x208a, 0x81}) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$UFFDIO_COPY(r7, 0xc028aa03, &(0x7f0000000680)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x3000, 0x1}) r8 = accept4(r0, &(0x7f0000000540)=@nfc_llcp, &(0x7f00000005c0)=0x80, 0x80000) ioctl$sock_inet6_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000600)) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf000) 17:19:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1472.461262] audit: type=1400 audit(1544807995.031:469): avc: denied { accept } for pid=27494 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1472.491784] Dev loop0: unable to read RDB block 6 [ 1472.505774] loop0: unable to read partition table 17:19:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x400000000, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) [ 1472.529753] loop0: partition table beyond EOD, truncated [ 1472.549830] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) 17:19:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf0ffffff00000000) [ 1472.688068] Dev loop0: unable to read RDB block 6 [ 1472.692999] loop0: unable to read partition table [ 1472.699579] loop0: partition table beyond EOD, truncated [ 1472.705071] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1472.801250] FAT-fs (loop2): bogus number of reserved sectors [ 1472.810509] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1472.896225] FAT-fs (loop2): bogus number of reserved sectors [ 1472.902370] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x20, 0x7}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000200)={r3, 0x200}, 0x8) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:55 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) 17:19:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x3f00000000000000) 17:19:55 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x60, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x3, "714b78ab1d2f0e02"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x668080, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="290000000400000000001000000000000600000000000000ffff000000000000010000000000a800005290c3bfbfaf14e0d032b6e4b3ada2c27d3ae38c1799b6db1377f23fc47f168ef0f4221daf1119f162bddb52563ca9ee5753aca2b1a928a700cbd1072d53bf1068c42abc7976fb3a1bdd9dad25dbdccc67ffb7dc7d9a649e7e7a7dfe245317a2e8540bffa5d7d6855c310a3ae512259c3eb51c11066ce46157da8c779f92f754a863eb6033023313469f2531408217a57c211b5d59be2edf55af10dfc8b04d0973865b3bb5cd40a7a907c03fa6916a6b4ecb20b3f79a059bf20acd9847436d5d7e86c55cfe356496ffd390a14119f8da820386ecdfe12847df0000000000"], 0x29) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="c5dc0000", @ANYRES16=r3, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) 17:19:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1473.510561] Dev loop0: unable to read RDB block 6 [ 1473.515479] loop0: unable to read partition table [ 1473.541553] loop0: partition table beyond EOD, truncated 17:19:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xfffff000) [ 1473.561312] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) signalfd4(r0, &(0x7f0000000000)={0xff}, 0x8, 0x80000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x8000000) [ 1473.688694] Dev loop0: unable to read RDB block 6 [ 1473.693806] loop0: unable to read partition table [ 1473.719915] loop0: partition table beyond EOD, truncated [ 1473.727422] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) 17:19:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xda230000) 17:19:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = dup(r0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000300)) write$P9_RMKDIR(r2, &(0x7f0000000000)={0x14, 0x49, 0x2, {0x80, 0x4, 0x4}}, 0x14) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:56 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000003d07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) listen(r0, 0x80000001) [ 1474.453315] Dev loop0: unable to read RDB block 6 [ 1474.462027] loop0: unable to read partition table [ 1474.475592] FAT-fs (loop2): bogus number of reserved sectors [ 1474.486511] loop0: partition table beyond EOD, truncated [ 1474.496998] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x400300) 17:19:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1474.510000] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1474.552384] audit: type=1400 audit(1544807997.121:470): avc: denied { listen } for pid=27594 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:19:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x130, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) [ 1474.601580] FAT-fs (loop2): bogus number of reserved sectors [ 1474.620331] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:57 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1474.659622] Dev loop0: unable to read RDB block 6 [ 1474.664512] loop0: unable to read partition table [ 1474.687753] loop0: partition table beyond EOD, truncated [ 1474.693239] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1474.807307] FAT-fs (loop2): bogus number of reserved sectors [ 1474.817844] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1474.864162] FAT-fs (loop2): bogus number of reserved sectors [ 1474.870416] FAT-fs (loop2): Can't find a valid FAT filesystem 17:19:57 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') write$9p(r2, &(0x7f0000000300)="6ff4d334e0980d4b6666f09801bcddb669ca68f15585a108a96ede2c79a243f4543fb55332769ee2b1dc51e85ec11da7e47a2a734ab4229dee09b9162040826d865d44e74cb5610b869f04f6cf4599d99ac674d5cf23fa7ea3004f40b06208a4388a6408ec3ba0b2dfe23bf97877bb153df296b846d2ad272698a2cf153ff9787faa0bb1956bc39699d9c8479b9eca27a1f0b993c43a6f6ff8efd89c02154ddd38737ac4840ab5152a06cbdeb02bb7e9053648ca14022a829e911f86690d3757a7b295e9ce97d27d88eebf1d4be5be290ab61f646116", 0xd6) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf0ffff) 17:19:57 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009d07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x0) 17:19:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2400, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1475.389670] Dev loop0: unable to read RDB block 6 [ 1475.394581] loop0: unable to read partition table [ 1475.425136] loop0: partition table beyond EOD, truncated 17:19:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xfffffff0) 17:19:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:19:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000080)={0x2, 0x1, [0x380000000000, 0x8ca, 0x6, 0xc00, 0x5, 0x146, 0x3, 0x8]}) [ 1475.435076] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x9effffff00000000) 17:19:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x45c, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 17:19:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf0ffffff) [ 1475.559514] Dev loop0: unable to read RDB block 6 [ 1475.569047] loop0: unable to read partition table [ 1475.599493] loop0: partition table beyond EOD, truncated 17:19:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) [ 1475.617475] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:58 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000ed07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1475.690509] FAT-fs (loop2): bogus number of reserved sectors [ 1475.709064] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1475.770203] FAT-fs (loop2): bogus number of reserved sectors [ 1475.792043] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1475.861338] Dev loop0: unable to read RDB block 6 [ 1475.870172] loop0: unable to read partition table [ 1475.881986] loop0: partition table beyond EOD, truncated [ 1475.894311] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1476.018548] Dev loop0: unable to read RDB block 6 [ 1476.023683] loop0: unable to read partition table [ 1476.029363] loop0: partition table beyond EOD, truncated [ 1476.035015] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r1, 0xe18, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40480c1}, 0x20040010) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:19:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x30000) 17:19:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) 17:19:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xc00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:58 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000003407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:19:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x300) 17:19:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="010000000002000000001400000004000700d649aac7ec62e5c4a39eaacd4a1f8ac4bb8db795aaa7170989fa9141ae5b9fcb8d9a1f82c2ae0326aa1f08c2c4d6bbc1b793ae1a835241b3755666c969df5575457f45bafb816f81b94739193510f23f842d5b128b130dc0a62faa1aff8134775d6ccaebb088cbfaa8ee2fe43f02107654ff2e90269d6dbebf0da9723056a2805db482a1bd26c4b09944aa44b38573"], 0x18}}, 0x0) 17:19:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1476.379383] Dev loop0: unable to read RDB block 6 [ 1476.391087] loop0: unable to read partition table 17:19:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x4) 17:19:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1476.420502] loop0: partition table beyond EOD, truncated [ 1476.441781] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1476.588836] Dev loop0: unable to read RDB block 6 [ 1476.595860] loop0: unable to read partition table [ 1476.608318] loop0: partition table beyond EOD, truncated [ 1476.627737] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:19:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:19:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="fafedcde52b69c61ad16494f501ab7a123d00f8a6aec851c41327222bc87ac6a088804f8043bc21c1508ad619a8bf90e007cc3cda0a5e75237dbcf2ba1c17cb82eceaeee878b5f1b92660900000000000000855642965b31613a347f7e478e7bdb9124e0b522de27a4de638235f2a062b000100000e5c9e57a5167322af8db384cd9c3b2a76b0ceb77a89a93a69528dc950e21bf64360ac1b4480754fe9e39fb66b721c25b60c85d1c97dab2cd02dd82bb3ddef3ddd14ac6d0bd0cac1575bb915d6ed947100deda2", @ANYRES64=r1, @ANYBLOB="010000000000000000001400000004000700"], 0x3}}, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') read$eventfd(r2, &(0x7f0000000040), 0x8) 17:19:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf00000000000000) 17:19:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) 17:19:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:19:59 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000ae07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1477.308340] Dev loop0: unable to read RDB block 6 [ 1477.318104] loop0: unable to read partition table [ 1477.324407] FAT-fs (loop2): bogus number of reserved sectors [ 1477.337470] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1477.344781] loop0: partition table beyond EOD, truncated 17:19:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x3000000) 17:19:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff000}]}]}, 0x20}}, 0x0) [ 1477.358734] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0xff, 0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) [ 1477.399522] FAT-fs (loop2): bogus number of reserved sectors [ 1477.434150] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 17:20:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x21000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x1000000) [ 1477.468848] Dev loop0: unable to read RDB block 6 [ 1477.473888] loop0: unable to read partition table [ 1477.489269] loop0: partition table beyond EOD, truncated [ 1477.502967] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1477.638983] FAT-fs (loop2): bogus number of reserved sectors [ 1477.663924] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1477.733970] FAT-fs (loop2): bogus number of reserved sectors [ 1477.740070] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:20:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:00 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01420000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x8) 17:20:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 17:20:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5a040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x2) 17:20:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x8) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000200)={0x2, 0xc, 0x4, 0x400000, {r3, r4/1000+30000}, {0x4, 0xf, 0x1, 0x1, 0x10000000000000, 0x240000000000, "d4340503"}, 0x5, 0x4, @planes=&(0x7f0000000080)={0x6, 0x5, @mem_offset=0x8, 0x7}, 0x4}) clock_gettime(0x7, &(0x7f00000000c0)) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000180)={0x0, 0x0, {0x13, 0x34, 0x15, 0x1d, 0xb, 0x9, 0x4, 0x0, 0xffffffffffffffff}}) 17:20:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1478.320561] Dev loop0: unable to read RDB block 6 [ 1478.334714] loop0: unable to read partition table [ 1478.351993] loop0: partition table beyond EOD, truncated [ 1478.370654] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="01000004000700"], 0x3}}, 0x4004) 17:20:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xfffffffffffff000) 17:20:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5d040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1478.508807] Dev loop0: unable to read RDB block 6 [ 1478.513882] loop0: unable to read partition table [ 1478.526810] loop0: partition table beyond EOD, truncated [ 1478.535992] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:20:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x200000000000000) 17:20:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) sched_getscheduler(r3) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='9\x00@\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) 17:20:01 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6004, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00190000", @ANYRES16=r1, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) 17:20:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x40030000000000) [ 1479.268824] Dev loop0: unable to read RDB block 6 [ 1479.286202] loop0: unable to read partition table [ 1479.301049] loop0: partition table beyond EOD, truncated [ 1479.321122] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x460, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x10000000) [ 1479.438305] Dev loop0: unable to read RDB block 6 [ 1479.443370] loop0: unable to read partition table [ 1479.467715] loop0: partition table beyond EOD, truncated [ 1479.489782] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:02 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:sound_device_t:s0\x00', 0x24) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x49069478) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 17:20:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x3f000000) 17:20:02 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000fa07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, 0x0, 0x0) 17:20:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x17, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x8, 0x240000) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x3, 0x2) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x1400) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000040)) r2 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$addseals(r0, 0x409, 0x1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000240)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) [ 1480.193445] FAT-fs (loop2): bogus number of reserved sectors [ 1480.204470] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1480.219069] Dev loop0: unable to read RDB block 6 [ 1480.224116] loop0: unable to read partition table 17:20:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xda23) [ 1480.241992] loop0: partition table beyond EOD, truncated [ 1480.259098] FAT-fs (loop2): bogus number of reserved sectors [ 1480.268522] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1480.270546] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BLKDISCARD(r1, 0x1277, 0x0) 17:20:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf00) 17:20:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x2004, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10020104}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)={0xbc, r1, 0x400, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) r3 = getpid() sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x2a0, 0x19, 0x720, 0x70bd27, 0x25dfdbfc, {}, [@nested={0x228, 0x93, [@generic="516b3171bf84d2a56388d570d087dead60eab329c9f7ed45de168bf487ff9ff7568b6e98ee1c36dfb4289ca2e20fea31205fcebf9fa617e1245cb963aa14d9d01517593eca704a7c3a21e4b6df26fc07714ba3bf61bafaaadb3a50dc6f3b313525d31ed34b9f942f94f28cb56aba77d1b36fad5d199263631d5646bc2c077e212c4a8ad291cab4d37795ca3cb0a944b5791ddc4c646d29363d3c3e68c8d69dbc1c74100e7e7d35859bb5dc75f58d4dad30f1e3e3ef464f5e8ca890f7f16a29860cd771019e69c835c71a825cf9bafc66ee87b03723a08982b67c22e24709cb3415", @generic="7f90e1b7fbda623538cf8f5931f9e1ce821f389eec52d0400b22b97390dba21206702a4522948a53d83fd8df4674aabe86e758caf73003dc04cebc5ea2e8c2", @typed={0x8, 0x6, @ipv4=@multicast1}, @typed={0x4, 0x48}, @generic="de3018aa33f4198a297dc5f400ee5b8e77491a8515307ba4bcb0d07a2d1258916a98f13f4ef2581506ee7849f7384c0f101856ffdc7fcbb0f26e0bcc2f2310563a6b751600b060cd847d95a0754676cc6438c8fd4a3a21a64be6ccbe35ce5853f9f61129ce43587c9dc2b4b3b9074c691a767a741d296a77c23db2d1035399e65ae486580572b3ac41a237f61dba00e9234ae3088e1a60daf5ef5d215b526d9b13e2b7bf", @typed={0xc, 0x7f, @str='TIPCv2\x00'}, @generic="273dac3333c70fd7f8a1e0b25f51b1b5d12f7a1dce2cb8706033b8304c2daf84416e5c365bec60b6c8aa1457f85366048904de51cd3caf832968648fda0ce3947c3158754574"]}, @typed={0x4, 0x4c}, @typed={0x8, 0x11, @pid=r3}, @nested={0x18, 0x8b, [@typed={0xc, 0xe, @u64=0x100}, @typed={0x8, 0x94, @u32=0x3800000000000}]}, @generic="eb0666a4c498ca9c018fa696a86e1133fa885bcb43d5a05677aea8da4f041f5a4f9c7a50213c15ab6b228608b17515f5545a6a42b4e830fd", @typed={0x8, 0x36, @u32=0x80000000}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x4}, 0x20000080) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000040)=""/36) [ 1480.398976] Dev loop0: unable to read RDB block 6 [ 1480.404026] loop0: unable to read partition table [ 1480.426330] loop0: partition table beyond EOD, truncated [ 1480.437413] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x10) 17:20:03 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000ce07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1480.628699] Dev loop0: unable to read RDB block 6 [ 1480.647407] loop0: unable to read partition table [ 1480.659002] loop0: partition table beyond EOD, truncated [ 1480.664656] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1480.748393] Dev loop0: unable to read RDB block 6 [ 1480.753584] loop0: unable to read partition table [ 1480.759502] loop0: partition table beyond EOD, truncated [ 1480.765245] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf) 17:20:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:03 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x80) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x9, 0x4) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18b70000", @ANYRES16=r2, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) 17:20:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, 0x0, 0x0) 17:20:03 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@rand_addr, @dev}, &(0x7f0000000080)=0xc) 17:20:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x3000000000000) [ 1481.139460] Dev loop0: unable to read RDB block 6 [ 1481.144684] loop0: unable to read partition table [ 1481.158363] loop0: partition table beyond EOD, truncated [ 1481.178076] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1481.318974] Dev loop0: unable to read RDB block 6 [ 1481.324085] loop0: unable to read partition table [ 1481.331849] loop0: partition table beyond EOD, truncated [ 1481.338074] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:04 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x201fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:20:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x1000000000000000) 17:20:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@newtclass={0x34, 0x28, 0x300, 0x70bd29, 0x25dfdbfe, {0x0, r2, {0xc, 0xfff3}, {0x7, 0xfff7}, {0xfffb, 0xa}}, [@TCA_RATE={0x8, 0x5, {0x100000001}}, @TCA_RATE={0x8, 0x5, {0x7fff, 0x7}}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x8801) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:04 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000cc07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f0000000380)=""/252, 0xfffffcd6}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000046, 0x0) 17:20:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xe4, r2, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x29}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xe, 0x1}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffff8}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x42aa8407}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x40}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xce}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffff4af6}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20008004}, 0x800) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x2) 17:20:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x400000000000000) [ 1481.518755] Dev loop0: unable to read RDB block 6 [ 1481.527750] loop0: unable to read partition table [ 1481.551898] loop0: partition table beyond EOD, truncated [ 1481.571884] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1481.623527] netlink: 'syz-executor1': attribute type 2 has an invalid length. [ 1481.668519] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 1481.699190] Dev loop0: unable to read RDB block 6 [ 1481.699811] netlink: 'syz-executor1': attribute type 2 has an invalid length. [ 1481.705512] loop0: unable to read partition table [ 1481.714284] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 1481.726269] loop0: partition table beyond EOD, truncated [ 1481.740070] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, 0x0, 0x0) 17:20:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xda23000000000000) 17:20:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1900, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:04 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "74b679", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 17:20:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x88, r2, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xa}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r3}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xfffffffffffffffe}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x20004080) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:04 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x800000000000000) 17:20:04 executing program 5: clone(0x0, 0x0, 0x0, 0x0, 0x0) symlink(0x0, 0x0) mknod(&(0x7f0000000280)='./file0\x00', 0x1042, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) execve(0x0, 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 17:20:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=""/198, 0xc6) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) r2 = dup3(r0, r0, 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000040)={0x6, 0x4, 0xffff, 0x3, 'syz0\x00', 0x1}) [ 1482.069131] Dev loop0: unable to read RDB block 6 [ 1482.074342] loop0: unable to read partition table [ 1482.086499] loop0: partition table beyond EOD, truncated [ 1482.098932] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x2000000) 17:20:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f0000000000), 0x8b, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x1, 0x1) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) [ 1482.228364] Dev loop0: unable to read RDB block 6 [ 1482.233964] loop0: unable to read partition table [ 1482.246067] loop0: partition table beyond EOD, truncated [ 1482.259488] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1482.325136] FAT-fs (loop2): bogus number of reserved sectors [ 1482.339537] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1482.426887] FAT-fs (loop2): bogus number of reserved sectors [ 1482.433669] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50}, 0x50) 17:20:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x805, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000100)=0xffffffff80000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000340)={0x6c07, 0x3, 0x3ff, 0x0, 0x4}) futex(&(0x7f0000000080)=0x2, 0xf, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x2, 0x0) flistxattr(r1, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.impure\x00') epoll_wait(r1, &(0x7f0000000180)=[{}, {}, {}], 0x3, 0xd) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f00000004c0)=0xfffffffffffdfffa) unshare(0x40000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x8, 0x4) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000300)=""/208) semtimedop(0x0, &(0x7f0000000140), 0x0, &(0x7f0000000200)={0x0, 0x989680}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000240)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000001600)={'broute\x00', 0x0, 0x3, 0x1000, [], 0x6, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000600)=""/4096}, &(0x7f0000001680)=0x78) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f00000002c0)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x7}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f00000016c0), &(0x7f0000001700)=0x4) getdents64(r3, &(0x7f00000000c0)=""/11, 0xeb) 17:20:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/45, 0x2d) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="df0000000000000000001400000004000700"], 0x18}}, 0x0) 17:20:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf000000) 17:20:05 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x19, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1482.964174] QAT: Invalid ioctl [ 1482.988730] Dev loop0: unable to read RDB block 6 [ 1483.008925] loop0: unable to read partition table [ 1483.016348] FAT-fs (loop2): bogus number of reserved sectors 17:20:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="0100000008000000000014000000040007007e74782cfb09d215bc70b38591ce8669e7e877152e708d10d1d854e412b2aa703b9e0a00ee233d99a1936c490af17d802efb65551b36036097e264aee6782740d035eed77a5e2ec181fc8de1c0eb46585fd40861df300144bfbd5b28f2b0fcdd51dc50334c3d774f410391ccfbeff52465415fec0c33230d6b3f76c06b4106bcf3dfe5d671443fde65ed9b7c4ff05d35fd0aa7441ce1d4de8c28ff7aa4e89b979eb06c67da53a2394b9fe9baa9a9ae60885d020a410a383b"], 0x18}}, 0x0) 17:20:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf0) [ 1483.036968] loop0: partition table beyond EOD, truncated [ 1483.044316] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1483.077428] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1483.114634] FAT-fs (loop2): bogus number of reserved sectors [ 1483.135004] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="010000000000000014000000040007000000"], 0x18}}, 0x0) 17:20:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1b00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x100000000000000) [ 1483.267447] IPVS: ftp: loaded support on port[0] = 21 [ 1483.268674] Dev loop0: unable to read RDB block 6 [ 1483.297578] loop0: unable to read partition table [ 1483.309141] loop0: partition table beyond EOD, truncated 17:20:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x400000000041, 0x7fffd) r3 = msgget(0x1, 0x24) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f0000000300)) r5 = getegid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000540)=0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000580)={{0xfffffffffffffffd, r4, r5, r6, r7, 0x10, 0xbc69}, 0x8, 0x1, 0x0, 0x20, 0x4f4, 0x8000, r8, r9}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x1f2, 0x7, 0x7fff, 0x0, 0x8, {0x0, @in6={{0xa, 0x4e23, 0x0, @mcast2, 0x3c}}, 0x7, 0x2, 0xfffffffffffffffc, 0x3, 0x9}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000200)=r10, 0x4) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) [ 1483.323993] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1483.749893] QAT: Invalid ioctl [ 1483.789758] IPVS: ftp: loaded support on port[0] = 21 17:20:06 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000eb07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x805, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000100)=0xffffffff80000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000340)={0x6c07, 0x3, 0x3ff, 0x0, 0x4}) futex(&(0x7f0000000080)=0x2, 0xf, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x2, 0x0) flistxattr(r1, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.impure\x00') epoll_wait(r1, &(0x7f0000000180)=[{}, {}, {}], 0x3, 0xd) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f00000004c0)=0xfffffffffffdfffa) unshare(0x40000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x8, 0x4) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000300)=""/208) semtimedop(0x0, &(0x7f0000000140), 0x0, &(0x7f0000000200)={0x0, 0x989680}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000240)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000001600)={'broute\x00', 0x0, 0x3, 0x1000, [], 0x6, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000600)=""/4096}, &(0x7f0000001680)=0x78) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f00000002c0)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x7}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f00000016c0), &(0x7f0000001700)=0x4) getdents64(r3, &(0x7f00000000c0)=""/11, 0xeb) 17:20:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x9effffff) 17:20:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7, 0x10200) write$P9_RCLUNK(r1, &(0x7f0000000340)={0x7, 0x79, 0x2}, 0x7) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="187e10f3652c4bb36cdba3738943000000", @ANYRES16=r2, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="16cc5493b5edf8e20cd448eb901a4368291d5b01d86b0244faab89ecb5ced638c1ceeb0a1ede7dd73b85e333d4a618b4f26f60e24ca67b50185501a7c85b279f91163c7782a4608b5bda4e90789e28e90603efc3fe260d", 0x57}, {&(0x7f00000000c0)="cf4a98eaba5bf69d8e81869959d086fcc655e3c4a10545f3", 0x18}], 0x2, &(0x7f00000001c0)=[{0xc0, 0x10a, 0x6, "931ef7dd6bb5a767af2014bad337e47380db2bee5cccd24d085541312454f2db053714433fad65114c409ecee5ccafdbad06dfd8163a2dcc8b6928646047dda759f47203d73f4db766648e3176347df5a74336931e3f9e6a516118ef6c7e84b6fd7427d106c10cab2fb70f4508728b698037c5217d41d88ac51b65fac7c3ee275c1621152b553fa45b8d7197b9820095b383369408d689eab8bfc77df67e82fc6270cee0300b491177f221fbb50bc4"}], 0xc0}, 0x1) 17:20:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50}, 0x50) 17:20:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1483.928223] Dev loop0: unable to read RDB block 6 [ 1483.933368] loop0: unable to read partition table [ 1483.947500] loop0: partition table beyond EOD, truncated [ 1483.958926] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x4000000) 17:20:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) [ 1484.090918] FAT-fs (loop2): bogus number of reserved sectors [ 1484.099642] Dev loop0: unable to read RDB block 6 [ 1484.105372] loop0: unable to read partition table [ 1484.113163] QAT: Invalid ioctl [ 1484.114574] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1484.137396] loop0: partition table beyond EOD, truncated [ 1484.165932] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1484.189480] FAT-fs (loop2): bogus number of reserved sectors 17:20:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x3f00) [ 1484.212815] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1484.228646] IPVS: ftp: loaded support on port[0] = 21 17:20:06 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000c307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5c040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x23da) 17:20:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000200)=""/154, &(0x7f0000000080)=0x9a) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) [ 1484.408676] Dev loop0: unable to read RDB block 6 [ 1484.423273] loop0: unable to read partition table [ 1484.434866] loop0: partition table beyond EOD, truncated [ 1484.442526] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1484.539444] Dev loop0: unable to read RDB block 6 [ 1484.548742] loop0: unable to read partition table [ 1484.570975] loop0: partition table beyond EOD, truncated [ 1484.589076] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:07 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x3) 17:20:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:07 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50}, 0x50) [ 1485.458689] Dev loop0: unable to read RDB block 6 [ 1485.463750] loop0: unable to read partition table 17:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x34000) 17:20:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0xfffffffffffffff0}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) [ 1485.515051] loop0: partition table beyond EOD, truncated [ 1485.522104] FAT-fs (loop2): bogus number of reserved sectors [ 1485.537811] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1485.545346] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1800b95b21b18fd5b1b44ac018fa", @ANYRES16=r1, @ANYBLOB="010000000000000000001400000004000700"], 0x18}}, 0x0) 17:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xffffff7f00000000) [ 1485.601661] FAT-fs (loop2): bogus number of reserved sectors [ 1485.617773] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1485.658958] Dev loop0: unable to read RDB block 6 [ 1485.665170] loop0: unable to read partition table [ 1485.694704] loop0: partition table beyond EOD, truncated 17:20:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x14000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1485.714591] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x300000000000000) 17:20:08 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:08 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000003b07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1485.833042] FAT-fs (loop2): bogus number of reserved sectors [ 1485.858866] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getgid() r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf0ffffffffffff) [ 1485.928111] FAT-fs (loop2): bogus number of reserved sectors [ 1485.943546] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1486.014830] Dev loop0: unable to read RDB block 6 [ 1486.028321] loop0: unable to read partition table [ 1486.050962] loop0: partition table beyond EOD, truncated [ 1486.073095] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1486.188511] Dev loop0: unable to read RDB block 6 [ 1486.193591] loop0: unable to read partition table [ 1486.205575] loop0: partition table beyond EOD, truncated [ 1486.217291] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:08 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2226, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xffffff7f) 17:20:08 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=0x0, @ANYBLOB="1900ba000000000000001400000004000700"], 0x18}}, 0x0) 17:20:08 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:08 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="432748002cda", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "1742fd", 0x8, 0x3f, 0x0, @dev, @ipv4={[], [], @multicast2}, {[], @icmpv6=@echo_reply}}}}}, 0x0) 17:20:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x3f, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = getpgrp(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1, r3}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x1, 0x0) 17:20:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) unshare(0x200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) [ 1486.438223] Dev loop0: unable to read RDB block 6 [ 1486.450740] loop0: unable to read partition table [ 1486.473826] loop0: partition table beyond EOD, truncated 17:20:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2a000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x802, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x121000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380)={0x0, 0x8f4a}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @empty}}}, &(0x7f00000004c0)=0x84) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x20, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x20040000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000640)={r3, &(0x7f0000000500)="0c6a0f6cadfea1406433c71a1d027ee29fc9a203adf471d27168d47e0fc2088a6100c01678485ca05f69089258b4832da4debd360b7e6c056a9e1045bfd95d931de3e9aa7db939e22c55071bcb8f3b5cc267fcaa2c514909c1b5dcdda2a4594b36b52aae5fc980b0", &(0x7f0000000580)=""/139}, 0x18) pipe(&(0x7f0000000740)={0xffffffffffffffff}) ioctl$KDGKBENT(r5, 0x4b46, &(0x7f0000000180)={0x100, 0x7fff, 0x7fff}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000845475ae40b1c6d142124471d4ab5defbf5ed1c469eb60b05552a4df6ebe5302fd1e00ff75080db2a9143d144178fef3cf66dad13e6edde02c713bb878ece17090bedb11faf906a7efd5d996ff160f3bd45127aa71349cd82687721d001908063d68e0f8df34107356ba9a37a3282f61f84883bcb98e1f2aba5bf9c107e5252fa62fc33f7be6f0d83156a6dd88867a4d"], 0x20}}, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) [ 1486.487779] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:09 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'bond_slave_0\x00'}) [ 1486.579657] Unknown ioctl 26124 [ 1486.588156] Dev loop0: unable to read RDB block 6 [ 1486.588675] FAT-fs (loop2): bogus number of reserved sectors [ 1486.593122] loop0: unable to read partition table [ 1486.610720] Unknown ioctl 26124 [ 1486.617656] loop0: partition table beyond EOD, truncated [ 1486.637866] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1486.642788] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:09 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:09 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x6000, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000040)=0x940000000000) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000200)={0x6, 0x4, 0x4, 0x8004e800, {r1, r2/1000+30000}, {0x1, 0xc, 0x0, 0x3, 0x3, 0xffffffffffffffe1, "93cbc3e1"}, 0x101, 0x3, @planes=&(0x7f00000000c0)={0xc, 0x1, @fd=r0, 0x1}, 0x4}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 17:20:09 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000001f07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:09 executing program 3: socketpair(0x3, 0x800, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x9, @empty, 0x5}, 0x1c) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1486.734474] FAT-fs (loop2): bogus number of reserved sectors [ 1486.743078] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5e040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1486.858476] Dev loop0: unable to read RDB block 6 17:20:09 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 1486.887511] loop0: unable to read partition table [ 1486.901933] loop0: partition table beyond EOD, truncated 17:20:09 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000002d000100000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000024001200140001006272696467655f73000000000000e1b5e0ff23519205af0f3c2248b6f73191409f79812e8cc1a8bc15f62e9ad20180bee40fe423dbe907e86ff355930d1aa8"], 0x44}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="c2410d548935a94abdcfefb8ed36f5194f98c0eba2aa7745373529d72fa2d201808d6ced60e0bdac5fc57283777839efc85f6ea2fd9a676d99552227c40db3eccd160b888001bf8c81550f4973a71cd4d0b277fd0bb88e757a5b4c32dcdac9bdacbbce23dcbffba576bfe0d1022e9d1be29f7631138ea61c60ee22304927faddbcad5f889e95238e93daf307b1f9c20747cae8831f8647bedb4dfa7704c3d1c6767ffa59dd18010f59658416e32ffa24f27b129275388fd750f1819558adf3461456e180d0ea2d", @ANYRES16=r2, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) [ 1486.929919] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1486.971045] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1486.996323] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 1487.025990] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 17:20:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$UI_DEV_DESTROY(r0, 0x5502) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007001e00020000000000"], 0x20}}, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000040)=0x8d) [ 1487.068638] Dev loop0: unable to read RDB block 6 [ 1487.075471] loop0: unable to read partition table [ 1487.102741] loop0: partition table beyond EOD, truncated 17:20:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) [ 1487.129093] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1487.174190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 1487.243556] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 1487.261739] FAT-fs (loop2): bogus number of reserved sectors [ 1487.307655] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1487.359356] FAT-fs (loop2): bogus number of reserved sectors [ 1487.365177] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:13 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:13 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000d107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:13 executing program 4: 17:20:13 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="2e2f6367726f75700000000000db887974a9d4b8049e206606a808fcfe3dd31291f786cee92a2ed9cc0eeb0f6e1b21700557d7d321c616f2a69f975e5d5807683103cf48516fd96063603193e1cc3109ac8eeb3489d6a5d86eea6fc66adc6c92378d49", 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000003c0)='./file0\x00', r1, &(0x7f0000000300)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x2) 17:20:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000080)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x848000}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x264, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6cc3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffc}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x108, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x80000001, @remote, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'syzkaller1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4d6a}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @local, 0x1d2f}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xaa, @ipv4={[], [], @empty}, 0x80}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe8}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf21}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000000}]}]}, 0x264}, 0x1, 0x0, 0x0, 0x4}, 0x880) 17:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1490.649108] Dev loop0: unable to read RDB block 6 [ 1490.661117] loop0: unable to read partition table [ 1490.689120] loop0: partition table beyond EOD, truncated 17:20:13 executing program 1: 17:20:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2800000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:13 executing program 4: [ 1490.723030] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:13 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:13 executing program 1: [ 1490.848757] Dev loop0: unable to read RDB block 6 [ 1490.861825] loop0: unable to read partition table [ 1490.891751] loop0: partition table beyond EOD, truncated [ 1490.907403] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:13 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000d407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:13 executing program 4: 17:20:13 executing program 1: 17:20:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:13 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:13 executing program 1: 17:20:13 executing program 4: 17:20:13 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05000000000000000000140000000c00070008000200000000000b19fda947b640b6a5b2d0a1733ef01fb9e689acd2a0930606ceede3834cb51d93"], 0x20}}, 0x0) 17:20:13 executing program 1: [ 1491.198431] Dev loop0: unable to read RDB block 6 [ 1491.208169] loop0: unable to read partition table 17:20:13 executing program 4: 17:20:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5c04000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1491.239793] loop0: partition table beyond EOD, truncated [ 1491.287591] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1491.368946] Dev loop0: unable to read RDB block 6 [ 1491.374322] loop0: unable to read partition table [ 1491.379937] loop0: partition table beyond EOD, truncated [ 1491.385540] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:14 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000d07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x800) 17:20:14 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:14 executing program 4: 17:20:14 executing program 1: 17:20:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:14 executing program 1: 17:20:14 executing program 4: 17:20:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:14 executing program 1: 17:20:14 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1491.628457] Dev loop0: unable to read RDB block 6 [ 1491.644740] loop0: unable to read partition table 17:20:14 executing program 4: [ 1491.670499] loop0: partition table beyond EOD, truncated [ 1491.705396] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1491.793629] Dev loop0: unable to read RDB block 6 [ 1491.798649] loop0: unable to read partition table [ 1491.803648] loop0: partition table beyond EOD, truncated [ 1491.810007] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:14 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002a07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:14 executing program 1: 17:20:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xe000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40001, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/fscreate\x00', 0x2, 0x0) r2 = getuid() r3 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000180)=@id, &(0x7f00000001c0)=0x10, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) r5 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpid() sendmsg$nl_generic(r0, &(0x7f0000000840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x244180}, 0xc, &(0x7f0000000800)={&(0x7f0000000300)={0x4e4, 0x22, 0x12, 0x70bd27, 0x25dfdbfb, {0x16}, [@typed={0x8, 0x38, @fd=r1}, @nested={0x258, 0x45, [@typed={0x8, 0x16, @u32}, @typed={0x8, 0x42, @uid=r2}, @typed={0x8, 0x5e, @str='\x00'}, @generic="8fef1ac27b535366467799feea24e4c03821cafdf290b71c29c26adf43282032a06d7f5f67334e5adbb4020786347f6c2b1090c7dd2a2749bce4717fda2f32ade393b135f6f9d29f8d70c1c9acb772942c2936fc054e481ac48c88432ab491c72c8c6dc80c0a12dbda0c72c02d4538b7fde32c8a044201330fedc7321507588dec821909e5420a253d62f8541cec34b86f1793abf404a59916ed75c501169fbb961e9f7a5f4bd18e1b98ac9893d305b51b4549a2c08144b5e1b11b9e64dfc4ed6a38d2240fd30d803b596ce8d8217f6c356f5f4bb0e444d9015a9d2c50b12198b164b9e1ca53e09800114784bafc9debad0ae2", @typed={0x90, 0x65, @binary="2f71dc156c927fd426d7ec303b0f0a950510fa4b5c1c90425c2b38299fbcdbd8f61a68890959fe482f69303a539618890289657c2275d1a1757fa34e4637b19541776385556619d2d99e189814e7f1839df3b55daa64c4889534b769151e0be852cf672248071e4cf1617bcd3fe9dc84323a6a7c8c82f394bfae7ba079c7fb331c3b4999491d4542cac765"}, @typed={0x8, 0x5d, @fd=r3}, @generic="19897ddf242c9a0ae6ca66eb5edda92aeb326e0572d447755c3f7b01a4e3aad95ac48f1d729d04c16b48b4f24f146607d1256109d5a4a581825d1787b23b5cc5ff59f736add2310e3c33d2b6d9c442be680333fa3aaf3f72ac29279fff9bf264671c37ec19e12d80099a6e8881e18eeee484d48df23c1c59a435c57bc4c88dae2da954412f55e6fbee021bd52b92", @typed={0xc, 0x63, @u64=0x9}, @typed={0xc, 0x1a, @u64=0x3}, @typed={0x8, 0x84, @pid=r4}]}, @generic="0e77d9feb72acf0dceb5533902cc2074996414d8bf3b76b3cc5a1067090e24a0bac9e3bfd14e6f73b08226ad47685e2dcb107674448fffae39e5c9a5466798412a872c83b2c5f0d89a89be800e1a777946966642d6334e0a6768564e9badf7f25827eab43dc60d7b7833018cae133c5f2e2ee8ecdb8ed47ce4a5b30b1af935360b58f9a912f662c3022ac192", @typed={0x8, 0x36, @uid=r5}, @nested={0x90, 0x67, [@typed={0xc, 0x11, @str='TIPCv2\x00'}, @generic="61446ce9a25c73a81cfde907b8450d44f604a65aa5f162fb64c02df9db143ed8116a35da0f7871f207aaaedf5ba6971c87b3808e0c5d5d8fd65241d4d363ce8a69175c74e0029f7eddae74f1c5caca17be66c30fbaec3228c6b939c844845fb490f50ed86a936940145507366d722e12f9e789fea2be13", @typed={0x8, 0x70, @ipv4=@multicast2}]}, @generic="1cdc3fb56147ce12c1f6bad84289dfc2b2207690471e2d18474eccbb29e35a4d9fd4ecf00b48f9a841afa8ca6861e9df9b8e9e848fc895cad7a75133d3cee8616fe4a9de48fc74881bf1fafdbfca4e86f8784c2d2fa556396c5ab86dc0c972876c95381f0c7bcf23d5cbc646dd064b668f0eec49ebe9789411467dba1314e329ceff7d0fc0fffc92a1", @nested={0x68, 0x19, [@typed={0x5c, 0x29, @binary="f9e854bac1adc2885c6e96d29f5c979cef981c7037d577cbea3d5880106ae2cbee3e8c45d1cbc560c3d18df0134510f8b10817f766456abcb6cac7561f45d3658646e7a49ea8d0b7fc54ab76e59d2995790bb9d665"}, @typed={0x8, 0x12, @uid=r6}]}, @generic="7bf24fbf0c6e93429c8ade1400ef859d77a481a88349cd28822d1b6575167295b5358c9b6d57a03c6f69c579d3a31bdb55c85e95e9aa9689d68244b0675ec0057c6124e80e5a42f86fa22b53a47a2cb870", @typed={0x8, 0x2e, @pid=r7}]}, 0x4e4}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="200001009322ea04fdf6d7f05ac7876b7c31", @ANYRES16=r9, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) 17:20:14 executing program 4: 17:20:14 executing program 1: 17:20:14 executing program 4: [ 1491.941998] FAT-fs (loop2): bogus number of reserved sectors [ 1491.956683] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xb21, 0x8000) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000040)=0x3c03) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:14 executing program 4: [ 1492.029206] FAT-fs (loop2): bogus number of reserved sectors [ 1492.066516] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1492.074020] Dev loop0: unable to read RDB block 6 17:20:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:14 executing program 1: [ 1492.093413] loop0: unable to read partition table [ 1492.112116] loop0: partition table beyond EOD, truncated [ 1492.121302] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1492.228507] Dev loop0: unable to read RDB block 6 [ 1492.233540] loop0: unable to read partition table [ 1492.239163] loop0: partition table beyond EOD, truncated [ 1492.244777] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:14 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000d207000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400, 0x100) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000180)=""/189) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000080)={0x80000000, 0x20, 0x9, 0x4, 0x5, 0x4, 0x0, 0x800, 0xffffffffffffff95, 0x3}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000bfb9eb20700000", @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) 17:20:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x462, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:14 executing program 4: 17:20:14 executing program 1: 17:20:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:14 executing program 4: 17:20:14 executing program 1: 17:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="20070002", @ANYRES32=r0, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x3}}, 0x0) fdatasync(r0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x91ff) 17:20:15 executing program 4: 17:20:15 executing program 5: syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1492.448373] Dev loop0: unable to read RDB block 6 [ 1492.453308] loop0: unable to read partition table [ 1492.477566] loop0: partition table beyond EOD, truncated 17:20:15 executing program 1: [ 1492.491687] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1492.494161] audit: type=1400 audit(1544808015.061:471): avc: denied { setattr } for pid=28348 comm="syz-executor3" path="socket:[515456]" dev="sockfs" ino=515456 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1492.658235] Dev loop0: unable to read RDB block 6 [ 1492.663160] loop0: unable to read partition table [ 1492.668777] loop0: partition table beyond EOD, truncated [ 1492.674248] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1700000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}, 0x0) 17:20:15 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000dc07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:15 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev, @mcast2, @mcast2, 0x4, 0x0, 0x0, 0x800000000116}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 17:20:15 executing program 5: syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffd, 0x412880) setsockopt$inet_dccp_buf(r2, 0x21, 0xcf, &(0x7f0000000040), 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 17:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:15 executing program 5: syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1492.898272] Dev loop0: unable to read RDB block 6 [ 1492.903495] loop0: unable to read partition table 17:20:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x26000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1492.945064] loop0: partition table beyond EOD, truncated [ 1492.958563] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1493.074232] Dev loop0: unable to read RDB block 6 [ 1493.082458] FAT-fs (loop2): bogus number of reserved sectors [ 1493.087386] loop0: unable to read partition table [ 1493.096825] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1493.107729] loop0: partition table beyond EOD, truncated 17:20:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xffffffffffffffff) 17:20:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) [ 1493.126789] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1493.156945] FAT-fs (loop2): bogus number of reserved sectors 17:20:15 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1493.178494] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\a\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) 17:20:16 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:16 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000440)='./bus\x00', 0x80) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff}) 17:20:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 17:20:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2a00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:16 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r2 = dup(r0) recvfrom$unix(r2, &(0x7f0000000240)=""/30, 0x1e, 0x100, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x80, 0x4c604ee2, 0x80, 0x2}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r3, 0x558a}, &(0x7f0000000200)=0x8) 17:20:16 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x6eb7f688) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) [ 1493.677915] Dev loop0: unable to read RDB block 6 [ 1493.683058] loop0: unable to read partition table [ 1493.701567] loop0: partition table beyond EOD, truncated [ 1493.727703] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:16 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5e04, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) socket$packet(0x11, 0x2, 0x300) [ 1493.839393] Dev loop0: unable to read RDB block 6 [ 1493.844375] loop0: unable to read partition table [ 1493.869995] loop0: partition table beyond EOD, truncated 17:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000a00140000000c0007000800020000000000"], 0x20}}, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x8) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40013040}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x202, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000800) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0xc4, r1, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x154e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6cc2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa567}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd50}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4c}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf43}]}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x250}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x80c0}, 0x4) [ 1493.887726] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:16 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01060000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1493.971492] device nr0 entered promiscuous mode 17:20:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r1, 0x310, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000001}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) 17:20:16 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:20:16 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1494.098147] Dev loop0: unable to read RDB block 6 [ 1494.103054] loop0: unable to read partition table [ 1494.117825] loop0: partition table beyond EOD, truncated [ 1494.123310] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1494.244351] Dev loop0: unable to read RDB block 6 [ 1494.256000] loop0: unable to read partition table [ 1494.276511] loop0: partition table beyond EOD, truncated [ 1494.293922] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:17 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x6eb7f688) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x40, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x334}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x341e61e4, 0x80000) 17:20:17 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:17 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x101, 0x40800) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0x80, 0x101}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1494.725422] Dev loop0: unable to read RDB block 6 [ 1494.731352] loop0: unable to read partition table [ 1494.742315] loop0: partition table beyond EOD, truncated [ 1494.759564] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, 0x0}, 0x48) 17:20:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x11000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:17 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1494.856868] device nr0 entered promiscuous mode [ 1494.918342] Dev loop0: unable to read RDB block 6 [ 1494.923250] loop0: unable to read partition table [ 1494.928924] FAT-fs (loop2): bogus number of reserved sectors [ 1494.937310] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1494.954708] loop0: partition table beyond EOD, truncated [ 1494.964975] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1495.050562] FAT-fs (loop2): bogus number of reserved sectors [ 1495.066458] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:17 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x6eb7f688) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:17 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x6eb7f688) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) quotactl(0x8, &(0x7f0000000040)='./file0/file0\x00', r2, &(0x7f0000000400)="2abac38e40a0d6b3a591a6c0c4d55e2b10f926c87bf0e58b9e85c579e36694c724a075") getxattr(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f0000000200)=""/121, 0x79) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40100, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r3, 0x10f, 0x86) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0300000007008b3f1e4f0f00000000000000000c000700080002"], 0x20}}, 0x0) 17:20:17 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004507000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:17 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5a04, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1495.397836] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 1495.424947] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 17:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1495.459139] Dev loop0: unable to read RDB block 6 [ 1495.464321] loop0: unable to read partition table [ 1495.473049] loop0: partition table beyond EOD, truncated [ 1495.479246] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0xa0084, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000040)={0x2, 0x10000, 0x1, 0x203}) 17:20:18 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1495.588249] Dev loop0: unable to read RDB block 6 [ 1495.594577] loop0: unable to read partition table [ 1495.600437] device nr0 entered promiscuous mode [ 1495.605411] loop0: partition table beyond EOD, truncated 17:20:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1700, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1495.642749] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000592b153e57aa41c8157a1c2000000084dbf284202212", @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) [ 1495.693447] device nr0 entered promiscuous mode 17:20:18 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1495.858312] Dev loop0: unable to read RDB block 6 [ 1495.865717] loop0: unable to read partition table [ 1495.878882] loop0: partition table beyond EOD, truncated [ 1495.892460] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1496.150757] Dev loop0: unable to read RDB block 6 [ 1496.155829] loop0: unable to read partition table [ 1496.172904] loop0: partition table beyond EOD, truncated [ 1496.185526] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:19 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x6eb7f688) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0xf0) 17:20:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0xffffffffffffff53, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000764f92ce3783696e0f2cc281448c0f6aacf8", @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}, 0x1, 0x0, 0x0, 0x2}, 0x0) 17:20:19 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5b04, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:19 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x206, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x800, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4c000) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01013d000000000000001c0000000c000700080002000000000000000000"], 0x20}}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x301000, 0x0) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000240)={0x4, 0xffff, 0x6, 0x4, 0x100000000, 0x8, 0x2756, 0x100, 0x1, 0xfffffffffffffffa, 0x0, 0x9}) 17:20:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="0100000008000000000014000000040007007e74782cfb09d215bc70b38591ce8669e7e877152e708d10d1d854e412b2aa703b9e0a00ee233d99a1936c490af17d802efb65551b36036097e264aee6782740d035eed77a5e2ec181fc8de1c0eb46585fd40861df300144bfbd5b28f2b0fcdd51dc50334c3d774f410391ccfbeff52465415fec0c33230d6b3f76c06b4106bcf3dfe5d671443fde65ed9b7c4ff05d35fd0aa7441ce1d4de8c28ff7aa4e89b979eb06c67da53a2394b9fe9baa9a9ae60885d020a410a383b"], 0x18}}, 0x0) [ 1496.659311] Dev loop0: unable to read RDB block 6 [ 1496.664444] loop0: unable to read partition table [ 1496.677957] loop0: partition table beyond EOD, truncated [ 1496.689074] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1496.697852] device nr0 entered promiscuous mode 17:20:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, 0x0, 0x0) 17:20:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioprio_set$pid(0x5, r3, 0x800) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000040)={0x1, 0x0, {0x116f, 0x1000, 0x100d, 0x5, 0xb, 0x6, 0x1, 0x6}}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000020000000000140000000c0028000800020000000000914d2da272a9ad3c5b989e791f8d2419632cf67338ebd74665b6a2ab51b2f29886e90e452ba54a46e36e23d4baf310eab16249ecb62b7e7a71e5e3c735324be25c8dbcdfe7a654e21226e1f880d6d67b144015e8251625bb88a0c38c67e562acaeb658257dd8b5d0a1be28ad5f3cc2ab4b828aa6b00000000000000000"], 0x20}}, 0x0) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x7, {{0x37, 0xffffffffffffffff, 0x2, r3}}}, 0x28) 17:20:19 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xe, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1496.838613] Dev loop0: unable to read RDB block 6 [ 1496.843668] loop0: unable to read partition table [ 1496.877345] loop0: partition table beyond EOD, truncated [ 1496.882844] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1496.983978] FAT-fs (loop2): bogus number of reserved sectors [ 1497.008408] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1497.267168] FAT-fs (loop2): bogus number of reserved sectors [ 1497.274827] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:19 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:19 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000be07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:19 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:20 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) accept$inet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) modify_ldt$read(0x0, &(0x7f00000003c0)=""/148, 0x94) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x3, 0x4) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="d900000000010000140000000c0007000800020000000700"], 0x20}}, 0x0) [ 1497.458971] Dev loop0: unable to read RDB block 6 [ 1497.464152] loop0: unable to read partition table [ 1497.481002] loop0: partition table beyond EOD, truncated [ 1497.497517] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1497.523232] FAT-fs (loop2): bogus number of reserved sectors 17:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1a1200, 0x0) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000040)) 17:20:20 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1497.575827] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1497.597056] device nr0 entered promiscuous mode 17:20:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, 0x0, 0x0) [ 1497.650094] Dev loop0: unable to read RDB block 6 [ 1497.661464] loop0: unable to read partition table [ 1497.662449] FAT-fs (loop2): bogus number of reserved sectors [ 1497.681951] loop0: partition table beyond EOD, truncated [ 1497.687322] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x1f, &(0x7f00000004c0)=0x7, 0x4) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffff9, 0x440480) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3ff, 0x2db, 0x3cb7bc68, 0x5}, {0x78, 0x7, 0x53, 0x100000001}]}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000c026605bd0b4000100000000000000bfaae60540c98aa8392d9854fb7d69a78e650449f7b7093b0e25fbadacd7acbae497eeeafc92a96fb1bd0e6a47c93949818861145f6f11527f8cef34c98d5dec5a0c67ee7c057e9e9505558f233c42be33edf301abf783e00bac2032eabffaf72a25b893ac130e31f001db8937a8"], 0x20}}, 0x0) connect$bt_rfcomm(r3, &(0x7f0000000280)={0x1f, {0x8, 0x3ff, 0x0, 0x2, 0x1000, 0x3}, 0x5}, 0xa) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="88000000a6cf2e5eeae2ad7d2e15cc4602a36d4b2be69e684ee04e88d5476a99002096ac0ad068eacc65d2823401bd7e30838c0bd0c89d866f818af0725307897b086b28fba821947337968c23bfc4633fcda59be188b2b101493d9ff18afb0f8665992973c1ec4572485a14c2bd5b3d95bd236c10b4d5928179b9551255e5d4cd3a03871c0e94695e22d622"], &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000003c0)={r4, @in6={{0xa, 0x4e21, 0xb6, @local, 0xff}}, 0x0, 0x7f, 0x9c11, 0x8, 0x80}, &(0x7f0000000240)=0x98) [ 1497.702518] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x24, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:20 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000ea07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1497.978802] Dev loop0: unable to read RDB block 6 [ 1497.986250] loop0: unable to read partition table [ 1497.998377] loop0: partition table beyond EOD, truncated [ 1498.003988] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:20 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="19ffffff", @ANYRES16=r1, @ANYBLOB="200000000000fedbdf250100000000000000080002000000000036015764400d9545d962ec00c22ef346456fe2a1f804ae80dbf04f82edc4c259ee677a0444aa38ddb5a879"], 0x20}}, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400401, 0x30) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) 17:20:20 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1498.108137] Dev loop0: unable to read RDB block 6 [ 1498.113046] loop0: unable to read partition table [ 1498.118402] loop0: partition table beyond EOD, truncated [ 1498.123893] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:20 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000a307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x14, r1, 0xffffffffffffffff, 0x70bd27, 0x40}, 0x14}}, 0xfffffffffffffffc) [ 1498.361830] device nr0 entered promiscuous mode 17:20:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000dc4bc34733f54cd2ca036400f1fb3c7191b69333fb8b24e125b7e064a8571f19a0b78862b00e4a40ef318005a31c21753dc5294691dc47fc6052027caef8ac66ded4404d6eec8bc4ecaab526240326c4029b92e1b8843a0dd3b2f20074fb952b3a27b0f4c53207ef4c2c4bb808095e004396241bba6e01d213b37eb2e2c6c5ffd54c1d1ecb56fa26aab0f2b793174274ae19d82ac8b541fba992ae2f94aba85b4333675960ca5a80b71d335796c127621a0e17c45bf6948252"], 0x20}}, 0x0) [ 1498.398673] Dev loop0: unable to read RDB block 6 [ 1498.403727] loop0: unable to read partition table [ 1498.432981] loop0: partition table beyond EOD, truncated 17:20:21 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1498.447564] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:21 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x20, r1, 0x1, 0x8000000, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x10) sync_file_range(r0, 0xa68e, 0x2, 0x5) [ 1498.588122] Dev loop0: unable to read RDB block 6 [ 1498.593166] loop0: unable to read partition table [ 1498.615448] loop0: partition table beyond EOD, truncated [ 1498.630311] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:21 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1498.858780] Dev loop0: unable to read RDB block 6 [ 1498.863973] loop0: unable to read partition table [ 1498.872658] loop0: partition table beyond EOD, truncated [ 1498.884016] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:21 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:21 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:21 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x70bd2a, 0x3, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1226000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1499.018128] Dev loop0: unable to read RDB block 6 [ 1499.023042] loop0: unable to read partition table [ 1499.023993] device nr0 entered promiscuous mode [ 1499.036139] loop0: partition table beyond EOD, truncated [ 1499.047324] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:21 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000df07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="006d2f97d4000000", @ANYRES16=r1, @ANYBLOB="c80000feffffff74718ac880000000000000"], 0x3}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x6) sendto$inet6(r2, &(0x7f0000000180)="bdbf1a62c9c9978eea4f14787f18a308187e0eb939859d3eb485c9edec80ca4fcac09b19334b86a59c430d798647f1b8f7fa20d639270d7bcbbe1bd3d4a7d16a57282441eac7cc97c32b8756d185df191cb87176b0dcb5de44198584b0da34d83b985f7bffed9432172a45e4be0efee2bb9affed2f92162d8aa575dda4e987f4acbcd0dfb5fe95410f833f4e56272e5d63448e4c0b3befce57c3657c0484a21d8a14c2766a02e8e5e2684e92e67839b690ebd1d34a755ab582bbd31a2fdcecfb1347351710ee0aae56e78873f3e0bd22ff74d5d0f68304f98287d977f67ecb7eabcb28ae6024a17067c747f88ed017ac8a590964357a22fd76602f3b2a569f", 0xff, 0x4000000, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) 17:20:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4c4002, 0x0) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000040)=0xeb) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:21 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[], 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1499.322527] Dev loop0: unable to read RDB block 6 [ 1499.342029] loop0: unable to read partition table [ 1499.369322] loop0: partition table beyond EOD, truncated [ 1499.391828] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1499.613892] Dev loop0: unable to read RDB block 6 [ 1499.623436] loop0: unable to read partition table [ 1499.639171] loop0: partition table beyond EOD, truncated [ 1499.655677] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1499.670248] device nr0 entered promiscuous mode 17:20:22 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x4, 0x100) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000280)={0x0, 0x0, 0x13, 0x7fffffff, 0xffffffffffffffff, 0x7, 0x20, 0x2, 0xbd5, 0x7, 0x0, 0x1}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r3 = fcntl$getown(r0, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x1a, &(0x7f0000000000)='bdevposix_acl_accesseth0)\x00', 0xffffffffffffffff}, 0x30) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) fremovexattr(r5, &(0x7f0000000200)=@random={'security.', 'bdev\\//%lo[-\\nodev\x00'}) kcmp(r3, r4, 0x7, r0, r0) r6 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x40, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r6, 0xc0106418, &(0x7f00000000c0)={0xffff, 0x3, 0xff, 0x3ac14062, 0x8, 0x5}) 17:20:22 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[], 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xe0000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1500.149876] device nr0 entered promiscuous mode 17:20:22 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:22 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000d007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000040)={{0x40}, 'port0\x00', 0x80, 0x400, 0x101, 0x7, 0x5, 0x7, 0x592, 0x0, 0x966756938e60361d, 0x1}) 17:20:22 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[], 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x27, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000140000e40b00070008000200000000008be5986838b152506568febf7dc5efdfee53fa0ebd2e8cf8ae0782805b8d824eb181e0bd89214062e83e50892ceb9c87068961df8d54dc3e4f6c23eeb47eb7ba408968603d3ff1b08d7ebd3f98b89306eb984d310000000000000000000000000000"], 0x20}}, 0x0) [ 1500.308258] Dev loop0: unable to read RDB block 6 [ 1500.320215] loop0: unable to read partition table [ 1500.346353] loop0: partition table beyond EOD, truncated [ 1500.367442] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1500.393884] netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. 17:20:23 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1500.639731] Dev loop0: unable to read RDB block 6 [ 1500.647028] loop0: unable to read partition table [ 1500.667072] loop0: partition table beyond EOD, truncated [ 1500.690538] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1500.752393] device nr0 entered promiscuous mode 17:20:23 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000140000001cfa06000800cdf86164a02c"], 0x20}}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101100, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000200)=0x4) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000180)={0x15, 0x96, &(0x7f0000000040)="07886930d758e99960006857f1965a46f1a7fab8385c1b937591b37362a8a5eadec87a9350ff95e088e874e04fa35a300e37827fd358ca5d43a81c435affb37158ea7da964bcba15cdc13b4174312c7821d1b1a989719894455c333ace0cfb29e6a9594c8136f08fcab2afde7081dd13d65c674982f0adf3579bca75ca5e5be6a0d27a7274897e2828cf7d15170cf6f44a64cc538ba1"}) 17:20:23 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:23 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000006a07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1500.844370] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 1500.863804] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 1500.918371] Dev loop0: unable to read RDB block 6 [ 1500.933414] loop0: unable to read partition table [ 1500.947650] loop0: partition table beyond EOD, truncated [ 1500.960174] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1501.098048] Dev loop0: unable to read RDB block 6 [ 1501.104160] loop0: unable to read partition table [ 1501.119087] loop0: partition table beyond EOD, truncated [ 1501.132786] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1501.282063] device nr0 entered promiscuous mode 17:20:23 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5804000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f0000000000)=':trusted^[wlan0&lo^wlan1\x00', 0x2) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/38) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:20:23 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:23 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000607000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c00070008000200000000004f9cb570f08cee29702a470002d2f11fe592d1d7e84766c0a3c60db7a8ce07c805b8cbeea47e5c33a4aebd53d03b77084a2ba9e923ac806100c0300bc80c60699915c4dfbf644878d46fd7fc98aae6c606b2d82abe27c3925376f6c8dc164986d21c21efb110028014807f110a20ceb5003a8412aeef91f5db0f9eb1dd91fe69277a13f9fceecf8c8f8def5ebbb23794f7ff6013b92202be1d3c36137604fcb3c85ccc4083d139f507c89a27f72a0d74e977c8ae9a0104000000000000d9c4"], 0x20}}, 0x0) [ 1501.388347] Dev loop0: unable to read RDB block 6 [ 1501.397907] loop0: unable to read partition table [ 1501.420648] loop0: partition table beyond EOD, truncated [ 1501.439508] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000040)=""/14) 17:20:24 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000"], 0xc) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1501.558465] Dev loop0: unable to read RDB block 6 [ 1501.563557] loop0: unable to read partition table [ 1501.584840] loop0: partition table beyond EOD, truncated [ 1501.604299] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1501.819779] device nr0 entered promiscuous mode 17:20:24 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="011d02000000ca9e71bc65b67664"], 0x20}}, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/pid_for_children\x00') 17:20:24 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000"], 0xc) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:24 executing program 1: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1501.938812] Dev loop0: unable to read RDB block 6 [ 1501.945360] loop0: unable to read partition table [ 1501.952674] loop0: partition table beyond EOD, truncated [ 1501.965639] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1501.978165] Dev loop1: unable to read RDB block 6 [ 1501.983284] loop1: unable to read partition table [ 1501.989972] loop1: partition table beyond EOD, truncated [ 1501.995779] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1502.108117] Dev loop0: unable to read RDB block 6 [ 1502.113028] loop0: unable to read partition table [ 1502.137357] loop0: partition table beyond EOD, truncated [ 1502.142868] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:24 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4008090) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x100, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') unshare(0x20000000) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:24 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000"], 0xc) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:24 executing program 1: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000b307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:24 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1502.438923] FAT-fs (loop2): bogus number of reserved sectors [ 1502.457296] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffea4, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, 0x0, 0x1}, 0x2}}, 0x0) [ 1502.488413] Dev loop0: unable to read RDB block 6 [ 1502.489419] Dev loop1: unable to read RDB block 6 [ 1502.496824] loop0: unable to read partition table [ 1502.507079] loop0: partition table beyond EOD, truncated [ 1502.508046] loop1: unable to read partition table [ 1502.527517] loop1: partition table beyond EOD, truncated 17:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0xb, 0x4) [ 1502.537787] FAT-fs (loop2): bogus number of reserved sectors [ 1502.542983] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1502.545954] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1502.567293] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1502.605758] device nr0 entered promiscuous mode 17:20:25 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200"], 0x12) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2600, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000180)={0x1, 0x0, 0x103, 0x2, {0x2, 0xfffffffffffff426, 0x1, 0x6}}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x80000, 0x0) write$selinux_access(r2, &(0x7f0000000240)={'system_u:object_r:getty_etc_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x101}, 0x46) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000003c0)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') ioctl$int_in(r2, 0x5421, &(0x7f0000000300)=0x800) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf0ffffffffffff}]}]}, 0x20}}, 0x0) [ 1502.668389] Dev loop0: unable to read RDB block 6 [ 1502.673329] loop0: unable to read partition table [ 1502.697288] loop0: partition table beyond EOD, truncated [ 1502.702770] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:25 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:25 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000003a07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100001d425400000000000000140000000c0007000800020000f878655209163b040ac65fccc0c989080ac6f96ad051b08e17bb59bcb9a6318051cc920ee34596e8d201a31f8b37c87843e1205e65ae87c1a2c53e8bb299c21ba1e2eee2495ec839613d2d9905019e9d"], 0x20}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) clock_getres(0x4, &(0x7f0000000080)) 17:20:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:25 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200"], 0x12) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff00000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="030000009cb50c66a2d56883dcd3d34ea516cbe04071eaff6b1c538d50eee331bae3b44ecb09d361411e2ef789e27db4624ae33f91", @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) [ 1503.259658] Dev loop0: unable to read RDB block 6 [ 1503.265134] loop0: unable to read partition table [ 1503.278904] loop0: partition table beyond EOD, truncated [ 1503.290540] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x14, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:25 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200"], 0x12) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) unshare(0x200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1503.400330] Dev loop0: unable to read RDB block 6 [ 1503.406249] loop0: unable to read partition table [ 1503.427091] loop0: partition table beyond EOD, truncated [ 1503.432256] device nr0 entered promiscuous mode 17:20:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1503.443757] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1503.520473] FAT-fs (loop2): bogus number of reserved sectors [ 1503.543776] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1503.638396] FAT-fs (loop2): bogus number of reserved sectors [ 1503.645216] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:26 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00'}, 0x10) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:26 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x30000) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0x6, 0x7}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) 17:20:26 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000"], 0x15) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x26, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x94, r1, 0x1, 0x70bd25, 0x0, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x94}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="00000010bfe51138cd440442a7f379a5b3d1de1c368ab74725b5851e83d4b40b408c2a3da258ff568503164f7706b0e540cad84c0e591486d35f1e33fd5857a961b922d5ea37abebcd8f47fa801ce8490dc6fe0079fd84ac39177e3fa63478b6375bed3d8f0c5af2456ee7ab366a09a6422cb50b67f5dcb89c7d02ebc245782cb906", @ANYRES16=r2, @ANYBLOB="020229bd7000fedbdf2511000000080004008000000008000400000000002000030014000600fe8000000000000000000000000000bb08000800040000006400010008000b007369700008000b0073697000080006007772720008000b007369700008000200000000000c0007002000000010000000080009001c000000080005000100000008000b007369700014000300fe8000000000000000000000000000aa"], 0xa8}, 0x1, 0x0, 0x0, 0x4}, 0x20004000) 17:20:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) [ 1503.980264] Dev loop0: unable to read RDB block 6 [ 1503.985360] loop0: unable to read partition table [ 1504.006556] loop0: partition table beyond EOD, truncated [ 1504.021044] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2622, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, &(0x7f0000000040)) 17:20:26 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000"], 0x15) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) [ 1504.127753] Dev loop0: unable to read RDB block 6 [ 1504.132843] loop0: unable to read partition table [ 1504.143797] loop0: partition table beyond EOD, truncated [ 1504.156335] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1504.190077] device nr0 entered promiscuous mode 17:20:27 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r5, 0x4) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:27 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000b807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="c9", @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) 17:20:27 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee2, 0x0) 17:20:27 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000"], 0x15) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1a, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:27 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee2, 0x0) 17:20:27 executing program 3: getgid() r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x100) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/133) semget$private(0x0, 0x3, 0x82) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000440)={0x0, 0x4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000004c0)={r2, 0x9}, 0x8) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="200049ad358a40e073cbd27fbe9c3e58a172b4ffc9e49b6f27682fb81c70200000000000000023d85b4617c58877bf9f2fc88a7eb1fe6b955012fc28fab0fa89e9c681412f4e7ead3b527c27ec9b0d804d4937f8773080c4a9c652272b5c1948faa3dc61601c9fb18ff71bb74e780b6f4cbdfc4d02831c363122cb323053915aef5a0bd0e9a9493c0e0fdc966267c3bbf9911a4def4bac308b5429937ef98b9e9545fe39776894205dd8c358c5b5c6da27f970f9bf06a20dbaf0daa5a27d8fc5c2845d971dc414ea092985bf026f2e4dbfeb540000000000000000000000000000000000001c0000", @ANYRES16=r1, @ANYBLOB="0100000000000000070808000200010000000000000000000000"], 0x3}}, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') ioctl$KIOCSOUND(r0, 0x4b2f, 0x800) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0xa02, 0x70bd2b, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x804) 17:20:27 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee2, 0x0) [ 1504.707978] FAT-fs (loop2): bogus number of reserved sectors [ 1504.718268] Dev loop0: unable to read RDB block 6 [ 1504.723341] loop0: unable to read partition table [ 1504.733449] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1504.742018] loop0: partition table beyond EOD, truncated [ 1504.748520] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000000)=0x1) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:27 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:27 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000000000000000000000402000600001100"], 0x17) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1504.797372] FAT-fs (loop2): bogus number of reserved sectors [ 1504.819863] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1504.898068] Dev loop0: unable to read RDB block 6 [ 1504.903687] device nr0 entered promiscuous mode [ 1504.905314] loop0: unable to read partition table [ 1504.927304] loop0: partition table beyond EOD, truncated [ 1504.932777] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:28 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) 17:20:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x7fff, 0x8, 0x8, 0x80000000, 0xc59, 0x8, 0x8, 0x100000000, 0x5, 0xff, 0x7, 0x7}) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000080)={0xca, 0x9, 0x5, 0x2, 0x3f, 0x5, 0x9, 0x6, 0x0, 0x1, 0x4, 0x3}) 17:20:28 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:28 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:28 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000000000000000000000402000600001100"], 0x17) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:28 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x118, r1, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb9a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9ec}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x8051}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x4000, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x40, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000180)=0x5, 0x8) 17:20:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1505.548393] Dev loop0: unable to read RDB block 6 [ 1505.564761] loop0: unable to read partition table [ 1505.570673] loop0: partition table beyond EOD, truncated [ 1505.583354] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:28 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000000000000000000000402000600001100"], 0x17) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="202e41581c26f7943604ce9bd5e9b8adfb8158b4e240000000000000009caababa20d3a8b0fb550337412f1ec931e2a835d2", @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) [ 1505.664133] device nr0 entered promiscuous mode [ 1505.688247] Dev loop0: unable to read RDB block 6 [ 1505.693222] loop0: unable to read partition table [ 1505.717711] loop0: partition table beyond EOD, truncated [ 1505.727849] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:28 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000480)={"62637366300000000002000000002000", 0x203}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 17:20:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:28 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:28 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x24000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1506.146044] FAT-fs (loop2): bogus number of reserved sectors [ 1506.157651] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1506.168262] Dev loop0: unable to read RDB block 6 [ 1506.173362] loop0: unable to read partition table [ 1506.188782] loop0: partition table beyond EOD, truncated 17:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1506.202343] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1506.236326] FAT-fs (loop2): bogus number of reserved sectors [ 1506.253274] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:28 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, 0x0, 0x0) 17:20:28 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) [ 1506.318524] Dev loop0: unable to read RDB block 6 [ 1506.323442] loop0: unable to read partition table [ 1506.323515] loop0: partition table beyond EOD, truncated [ 1506.347295] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0000001e0a14f756d4676e048cdd06002184a2cb67af09c3de2418fe0000000000004ebdfef71e1f9b0be727", @ANYRES16=r1, @ANYBLOB="01000000000000910000140000000c0007000800020000000000512de70d87413dbe85fa3f51ffe712fd0cfaee518d7ea361bfdf7aa3bb801e9a36bdcbb2"], 0x20}}, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7fff, 0x600) ioctl$RTC_UIE_OFF(r2, 0x7004) [ 1506.368896] device nr0 entered promiscuous mode 17:20:29 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002e07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1506.561803] Dev loop0: unable to read RDB block 6 [ 1506.566801] loop0: unable to read partition table [ 1506.587359] loop0: partition table beyond EOD, truncated [ 1506.607400] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1506.728116] Dev loop0: unable to read RDB block 6 [ 1506.733023] loop0: unable to read partition table [ 1506.755188] loop0: partition table beyond EOD, truncated [ 1506.779467] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:29 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 17:20:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x18000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:29 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) shutdown(r0, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x101, 0x141000) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0]) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x20, r3, 0x1, 0x0, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="01c1ab3149a7735650377de6ac140008", @ANYRES16=r3, @ANYBLOB="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"], 0x2ac}, 0x1, 0x0, 0x0, 0x4004}, 0x50) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000080)={'team0\x00', r4}) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000100)) 17:20:29 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, 0x0, 0x0) 17:20:29 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1506.924090] audit: type=1400 audit(1544808029.491:472): avc: denied { shutdown } for pid=29034 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:20:29 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:29 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x5, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0xfffffffffffffffc) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585604, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000040)) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f0000000200)=0x1e) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x101, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000000000000000140000200c0007000800020000000000"], 0x20}}, 0x0) [ 1506.979032] FAT-fs (loop2): bogus number of reserved sectors [ 1507.013063] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1507.020056] Dev loop0: unable to read RDB block 6 17:20:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) [ 1507.029594] loop0: unable to read partition table [ 1507.042617] loop0: partition table beyond EOD, truncated [ 1507.067307] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1507.087051] device nr0 entered promiscuous mode 17:20:29 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, 0x0, 0x0) [ 1507.110722] FAT-fs (loop2): bogus number of reserved sectors [ 1507.144780] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = creat(&(0x7f0000000040)='\x00', 0x23) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x54, 0x4) syz_execute_func(&(0x7f0000000200)="c46171e023f245aac481f8ae5600c4a1feaca6a4768de7a099e299e2a5546201c4e1797f2df9ff000066478f3825c0c4c17c511fd0f8") r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x210000, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1507.205400] Dev loop0: unable to read RDB block 6 [ 1507.229794] loop0: unable to read partition table [ 1507.234801] loop0: partition table beyond EOD, truncated [ 1507.265866] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 17:20:30 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009f07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:30 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=""/153, 0x99}, 0x40) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:30 executing program 5 (fault-call:3 fault-nth:0): syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0)=0x2, 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000e40)="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", 0x481, 0x0, &(0x7f00000004c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r1, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000080)=""/168, 0xa8}}], 0x1, 0x0, &(0x7f0000004540)={0x77359400}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="96d9a47e090f7a69957bd033aedb872a1b47c4104163", @ANYRES16=r4, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000200)={{0x1011, @dev={0xac, 0x14, 0x14, 0xf}, 0x4e24, 0x1, 'none\x00', 0x36, 0xde01, 0x16}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x4e23, 0x2000, 0x5, 0x8000, 0x7}}, 0x44) [ 1507.743831] FAT-fs (loop2): bogus number of reserved sectors [ 1507.767502] Dev loop0: unable to read RDB block 6 [ 1507.772574] loop0: unable to read partition table [ 1507.778047] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) [ 1507.792850] loop0: partition table beyond EOD, truncated [ 1507.812309] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:30 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1507.839785] FAT-fs (loop2): bogus number of reserved sectors [ 1507.858094] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1507.868467] device nr0 entered promiscuous mode 17:20:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) 17:20:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffb, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1507.929305] Dev loop0: unable to read RDB block 6 [ 1507.935122] loop0: unable to read partition table [ 1507.954192] loop0: partition table beyond EOD, truncated [ 1507.968120] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:30 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000c407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) 17:20:30 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x0, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1508.188040] Dev loop0: unable to read RDB block 6 [ 1508.202895] loop0: unable to read partition table [ 1508.227339] loop0: partition table beyond EOD, truncated [ 1508.241906] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x0, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:31 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x0, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000180)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000001680)=[{&(0x7f0000000300)=""/173, 0xad}, {&(0x7f00000003c0)=""/126, 0x7e}, {&(0x7f0000000440)=""/124, 0x7c}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/218, 0xda}, {&(0x7f00000015c0)=""/161, 0xa1}], 0x6, &(0x7f0000001700)=""/220, 0xdc}, 0x40000001) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000040)={0x4, 0x4b, 0xffff, 0xff, 0x2, 0x80000000}) [ 1508.421015] Dev loop0: unable to read RDB block 6 17:20:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:31 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1508.486600] loop0: unable to read partition table [ 1508.494504] loop0: partition table beyond EOD, truncated [ 1508.501375] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) 17:20:31 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000006807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1508.650835] device nr0 entered promiscuous mode [ 1508.679652] Dev loop0: unable to read RDB block 6 17:20:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x58040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) [ 1508.700535] loop0: unable to read partition table 17:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYRES16=0x0, @ANYBLOB="0100000000001400000e22255b0bfe8d000c0007ff033fe62328bf68671e06000000005e0000e60735f08bd436b471bd8ff40ea446536e4e9b2d3322be079619e8974f58f89c334c1261c19de2120c7f9e8e5c05d3981d02f9cd1300000000b0445bf7f8c731cb2421b35662ce8afd5679070858a1723a2d5823908dc288519c34553a724bad64fbc807fcd92de277b697c5b08b3896b59e15296498550bc64a0d44b5ac9b8c15ded120c8b3e248e8139420b509d2d01c6e129d9cab1741a467141b8f7f7a2a81ec4bf3783260e93ba5883b650308ee1171213d76159a79b22860733ebc8740bb2345cb9ba4b00cb01f630da24a03e667cd26a3"], 0x3}}, 0x0) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbff, 0x30000}, 0xc) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8004000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x201, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1f, 0x5c8a592b, @l2={'ib', 0x3a, 'erspan0\x00'}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80002, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000100)=0x1) r3 = shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffb000/0x2000)=nil) r4 = geteuid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, r2, 0x0, 0x2, &(0x7f0000000640)='ib'}, 0x30) r9 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r3, 0x1, &(0x7f00000006c0)={{0x3, r4, r5, r6, r7, 0x20, 0x9}, 0x5, 0x3, 0xffffffff, 0x1000, r8, r9, 0x3f}) [ 1508.737884] loop0: partition table beyond EOD, truncated [ 1508.748225] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:31 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1508.791772] audit: type=1400 audit(1544808031.361:473): avc: denied { bind } for pid=29136 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1508.938314] Dev loop0: unable to read RDB block 6 [ 1508.944412] loop0: unable to read partition table [ 1508.956207] loop0: partition table beyond EOD, truncated [ 1508.969789] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1509.197992] Failed to obtain node identity [ 1509.202852] Enabling of bearer rejected, failed to enable media [ 1509.218899] Failed to obtain node identity [ 1509.223165] Enabling of bearer rejected, failed to enable media 17:20:31 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) 17:20:31 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008507000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:31 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1509.325820] FAT-fs (loop2): bogus number of reserved sectors [ 1509.332258] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x8, 0x4, 0x1, 0x1000, 0x3f, 0x1, 0x4b, 0x1f3, 0x0}, &(0x7f0000000040)=0x20) r3 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x9, 0x40) write$9p(r3, &(0x7f00000002c0)="097f5bfde5e19d8fcee8e207dba943eefc938f1b3ff15a1bbc769eb821daa1d82eee51a6a2451d65cd70345561b1011d7349096b1d80e5c388e4651b433763ca18b60338d6b6ae0128dbe5fd8935479f47326d18c1ccdac737c82f53d5920b3f3289d9fc2bc4834907db20f8ede2352e7d55797ed0522618c0a0b020311f12944220bab824ecd5d2ead5d52b27200e884749ec", 0x93) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r2, 0x1}, &(0x7f00000000c0)=0x8) [ 1509.368376] Dev loop0: unable to read RDB block 6 [ 1509.376295] loop0: unable to read partition table [ 1509.389850] loop0: partition table beyond EOD, truncated [ 1509.402692] FAT-fs (loop2): bogus number of reserved sectors 17:20:32 executing program 1 (fault-call:3 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000600)={0x9, 0x8000, 0xdc, 0x0, 0x0}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e22, 0x6, @ipv4={[], [], @loopback}, 0x10001}}, 0x5, 0x80000000000, 0xffffffff, 0x1, 0xc3}, &(0x7f00000005c0)=0x98) ioctl$int_out(r0, 0x5462, &(0x7f0000000180)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x21c, r3, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xad}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff70}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xafb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x5}, 0x20000000) [ 1509.413339] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1509.424358] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2c000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:32 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1509.538077] Dev loop0: unable to read RDB block 6 [ 1509.545047] loop0: unable to read partition table [ 1509.567522] loop0: partition table beyond EOD, truncated [ 1509.573507] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1509.611610] device nr0 entered promiscuous mode [ 1509.711790] FAT-fs (loop2): bogus number of reserved sectors [ 1509.720078] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:32 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000300)={0x6, @pix_mp={0x7, 0x401, 0x41414270, 0x6, 0xf, [{0x0, 0x3}, {0x3, 0x1}, {0x10000, 0xff6a}, {0x7, 0x8}, {0x40, 0x10001}, {0xbc98, 0x3bb6}, {0xffffffffffffffc1, 0x4}, {0x3}], 0x9, 0xff, 0x3, 0x2}}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000040)={0x7fff, 0x7f727753, 0x2, 0x3, 0x1, @stepwise={{0xfffffffffffffffa, 0x8}, {0x4, 0x5}, {0x3ac, 0x401}}}) 17:20:32 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01004200ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x5452, 0x0) 17:20:32 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1510.053684] FAT-fs (loop2): bogus number of reserved sectors [ 1510.060815] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x17000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') getresuid(&(0x7f0000000180), &(0x7f0000000300), &(0x7f0000000340)=0x0) r3 = getuid() syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x78, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000200)="ae732565aa366e6b261dce8e74d052df5ae7cf24657d0a511f20e10f6eeb9e0c9656fb7cba9188bbd586042daad5b01ccf3c53940bd8c1ef802caad859d01d2e945ad5b52bd5e7cf1e50d7feb619d7a458148da448ee8e9de4a740c9cd91e05d5ed75670d02aba5323e683b38a04f6c98f79cdabd083734648980ed08eb3a8e14fcb4ac5f63f608629c45ca29ec5c40c1f9ac27ac94821254175d0f7d9cf813583fa20dbc9", 0xa5, 0x101}, {&(0x7f0000000080)="72ae0364018024f141d212b8", 0xc, 0x8}], 0x241000, &(0x7f0000000380)={[{@umask={'umask', 0x3d, 0x88d1}}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r2}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@dont_measure='dont_measure'}]}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x3, 0xa00) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000440)) 17:20:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x5460, 0x0) [ 1510.179561] Dev loop0: unable to read RDB block 6 [ 1510.184648] loop0: unable to read partition table [ 1510.190065] FAT-fs (loop2): bogus number of reserved sectors [ 1510.197483] loop0: partition table beyond EOD, truncated [ 1510.203146] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1510.206061] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1510.279299] FAT-fs (loop2): bogus number of reserved sectors [ 1510.285964] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1510.317341] device nr0 entered promiscuous mode [ 1510.322525] Dev loop0: unable to read RDB block 6 17:20:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x5451, 0x0) [ 1510.327876] loop0: unable to read partition table [ 1510.335933] loop0: partition table beyond EOD, truncated [ 1510.360209] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5704, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:32 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x15000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:33 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000bb07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1510.608360] Dev loop0: unable to read RDB block 6 [ 1510.614710] loop0: unable to read partition table [ 1510.627938] loop0: partition table beyond EOD, truncated [ 1510.641106] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1510.738238] Dev loop0: unable to read RDB block 6 [ 1510.743247] loop0: unable to read partition table [ 1510.761078] loop0: partition table beyond EOD, truncated [ 1510.779038] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:33 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, 0x0) 17:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x2) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYBLOB="0100000000000000000114ff0f000000000000000200000000ed0ccf0c568eff6600"], 0x20}}, 0x0) 17:20:33 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:33 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000f107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x13, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffeb5, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRES16=r1, @ANYRES16=r1, @ANYRESHEX=r0], 0x20}}, 0x20040000) 17:20:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0xc020660b, 0x0) 17:20:33 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1511.008441] Dev loop0: unable to read RDB block 6 [ 1511.027777] loop0: unable to read partition table [ 1511.052174] loop0: partition table beyond EOD, truncated [ 1511.067294] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1511.079098] device nr0 entered promiscuous mode [ 1511.092423] FAT-fs (loop2): bogus number of reserved sectors 17:20:33 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1511.113301] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)={0x28, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffff8}]}]}, 0x28}}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x2, &(0x7f0000000080)=[0xee00, 0x0]) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000180)={0xfffffff, 0x8000, 0x9d4, [], &(0x7f00000000c0)={0x980926, 0xbe, [], @value=0xf8}}) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x2, {0x2010, {0x10, 0x0, 0x6}, 0x0, r3, r4, 0x4, 0x1, 0x80, 0xffff, 0x80000001, 0xd55200000, 0x100, 0x88a3, 0x1, 0xbf3, 0x2, 0x554188d7, 0xfffffffffffffff9, 0xff, 0x3ff}}, 0xa0) [ 1511.163170] FAT-fs (loop2): bogus number of reserved sectors [ 1511.176049] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0xc0045878, 0x0) [ 1511.218386] Dev loop0: unable to read RDB block 6 [ 1511.223467] loop0: unable to read partition table [ 1511.238080] loop0: partition table beyond EOD, truncated [ 1511.251223] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1511.260948] QAT: Invalid ioctl [ 1511.266870] QAT: Invalid ioctl 17:20:34 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x17b) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 17:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3d, 0x2) r3 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x80000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x8001, 0x6, 0x6, 0x2, 0x5, 0xffff, 0x1, 0x6, 0x2, 0x9, 0x1, 0x100000000, 0xffff, 0xcd, 0x37]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000400)=ANY=[@ANYRES32=r5, @ANYBLOB="5d000000c419780f04aa4935581900a1a11baf130ed88a4a8504a42524a7d1a17c1a1e0ee829d422a38eb9e2da411f0b8331cbc7b1a87674f35ef2826d76577ecab5fbca023107893520424a8f9f9c07e59c19053247e65ce9e4525b0166e5eb5c"], &(0x7f0000000480)=0x65) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@gettclass={0x24, 0x2a, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, r4, {0xb, 0x10}, {0xfff3, 0xf}, {0x6}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000001c0)={r2, 0x0, 0x101, 0x3, 0xffffffff80000001}) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000640)=0xc46e) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f00000004c0)={[{0x1, 0x4, 0x4, 0x7, 0x6, 0x54800000, 0x800, 0x5, 0xffff, 0xfffffffffffffffe, 0x2f092d74, 0x4, 0x3}, {0x3, 0x2400, 0x7fffffff, 0x6, 0x1f, 0x7, 0xf07, 0x800, 0x2, 0x3, 0x0, 0x6, 0x6}, {0x4, 0xfffffffffffffffc, 0xa1, 0x27, 0x5, 0x9, 0x8000, 0x40, 0x80000000000, 0xe68, 0x1, 0x8, 0x6}], 0x5}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="200800002e080c42ead463a43bb1d8a4cdffc55f88f03f8f0a128281cddb8866ef64295465ac21fb48ed333bb486eb00004133c9f9b48a323a24852d48373acdc3197227e9c87457a332d5d4de1e5509173f7e95473cdc9769809694a29877cd854b5e98ff6b30feb1da5cc1da52e771f7406d362ca71b0deceeb7d48b510726fc0d17fd1899bc9fd218de045d445b21417ec7c46da2757df0244969c2cb082900c10d310098bee1e1f2", @ANYRES16=r1, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000680)) 17:20:34 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff014c0000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4b47, 0x0) 17:20:34 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x23, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:34 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000bb3d0000b945391fbcee039b07306651000fbe00"], 0x20}}, 0x0) [ 1511.708414] Dev loop0: unable to read RDB block 6 [ 1511.713505] loop0: unable to read partition table [ 1511.734995] loop0: partition table beyond EOD, truncated 17:20:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x5421, 0x0) 17:20:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xd000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1511.759695] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x480200, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'dummy0\x00', {0x2, 0x4e21, @remote}}) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000040)) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1511.896945] device nr0 entered promiscuous mode [ 1511.907874] Dev loop0: unable to read RDB block 6 [ 1511.919417] loop0: unable to read partition table [ 1511.930946] FAT-fs (loop2): bogus number of reserved sectors [ 1511.939802] loop0: partition table beyond EOD, truncated 17:20:34 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x40049409, 0x0) [ 1511.955485] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1511.960154] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1512.050429] FAT-fs (loop2): bogus number of reserved sectors [ 1512.056271] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:34 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x17b) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 17:20:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x9004, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="08022568447e639c3f7ff4bd7000fbdbdf27ffff0000"], 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x40) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000300)={{0xfffffffffffffffb, 0x8}, 0x1, 0x100000000, 0x5af0, {0x2, 0x6}, 0x6, 0x80000001}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffe68, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="effeffff", @ANYRES16=r2, @ANYBLOB="01000000000000000000140000000c0007000800020000000000"], 0x20}}, 0x0) 17:20:34 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000001d07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4020940d, 0x0) 17:20:34 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x900, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x541b, 0x0) 17:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000200)={&(0x7f0000000080)=[0x7f, 0x7fff, 0xd6, 0xfe1, 0x5, 0xffffffff, 0x0, 0x0, 0x10001], 0x9, 0x3, 0x3, 0x6, 0x0, 0x2, {0x400, 0x7f, 0x0, 0x9, 0x8, 0x80000001, 0x41de, 0x2, 0x7fff, 0x30, 0xffffffff, 0x1, 0x3ff, 0x564, "28088d616ed55ed876f32582a86c127528b329712da88d8a48a348fba4903622"}}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1512.494333] FAT-fs (loop2): bogus number of reserved sectors [ 1512.519186] Dev loop0: unable to read RDB block 6 [ 1512.520351] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1512.530065] loop0: unable to read partition table [ 1512.530137] loop0: partition table beyond EOD, truncated [ 1512.573707] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1512.600082] FAT-fs (loop2): bogus number of reserved sectors 17:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000040)={0x800100f, 0x4, 0x1}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) [ 1512.623484] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1512.677112] device nr0 entered promiscuous mode 17:20:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x40087602, 0x0) 17:20:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:35 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1512.738100] Dev loop0: unable to read RDB block 6 [ 1512.743014] loop0: unable to read partition table [ 1512.772142] loop0: partition table beyond EOD, truncated [ 1512.801103] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1512.889579] FAT-fs (loop2): bogus number of reserved sectors [ 1512.906860] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1513.165783] FAT-fs (loop2): bogus number of reserved sectors [ 1513.173000] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:35 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x17b) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 17:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') syz_open_dev$sndpcmp(&(0x7f0000001180)='/dev/snd/pcmC#D#p\x00', 0x8798, 0x80000) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x197}}, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x8, 0x10000) signalfd4(r2, &(0x7f0000000040)={0xfff}, 0x8, 0x80000) 17:20:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee3, 0x0) 17:20:35 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000d707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:35 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x12000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x80087601, 0x0) 17:20:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000b560e413ef751bd1"], 0x20}}, 0x0) [ 1513.338875] Dev loop0: unable to read RDB block 6 [ 1513.343956] loop0: unable to read partition table [ 1513.362800] loop0: partition table beyond EOD, truncated [ 1513.373053] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1513.402703] FAT-fs (loop2): bogus number of reserved sectors [ 1513.421718] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x5450, 0x0) [ 1513.478603] Dev loop0: unable to read RDB block 6 [ 1513.483757] loop0: unable to read partition table [ 1513.504617] loop0: partition table beyond EOD, truncated [ 1513.515886] FAT-fs (loop2): bogus number of reserved sectors 17:20:36 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x800) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000001}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000000340)=""/28, &(0x7f0000000300)=0x1c) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) 17:20:36 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:36 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000de07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1513.528204] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1513.536311] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1513.550019] device nr0 entered promiscuous mode [ 1513.728178] Dev loop0: unable to read RDB block 6 [ 1513.735459] loop0: unable to read partition table [ 1513.740705] loop0: partition table beyond EOD, truncated [ 1513.746317] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1513.828418] Dev loop0: unable to read RDB block 6 [ 1513.833516] loop0: unable to read partition table [ 1513.844760] loop0: partition table beyond EOD, truncated [ 1513.857328] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:36 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0xc0045878, 0x0) 17:20:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:36 executing program 3 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:36 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:36 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01004000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1514.051997] FAULT_INJECTION: forcing a failure. [ 1514.051997] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.094205] CPU: 1 PID: 29402 Comm: syz-executor3 Not tainted 4.20.0-rc6+ #152 [ 1514.101618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.101626] Call Trace: [ 1514.101663] dump_stack+0x244/0x39d [ 1514.101690] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1514.101726] should_fail.cold.4+0xa/0x17 [ 1514.101746] ? zap_class+0x640/0x640 [ 1514.101769] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1514.101790] ? __lock_acquire+0x62f/0x4c20 [ 1514.117372] ? find_held_lock+0x36/0x1c0 [ 1514.117420] ? perf_trace_sched_process_exec+0x860/0x860 [ 1514.117442] ? avc_has_perm_noaudit+0x44b/0x630 [ 1514.117467] __should_failslab+0x124/0x180 [ 1514.117487] should_failslab+0x9/0x14 [ 1514.135556] kmem_cache_alloc_node_trace+0x270/0x740 [ 1514.135588] __get_vm_area_node+0x130/0x3a0 [ 1514.135611] __vmalloc_node_range+0xc4/0x750 [ 1514.135628] ? bpf_prog_alloc+0xe3/0x3e0 [ 1514.135657] ? find_held_lock+0x36/0x1c0 [ 1514.143940] __vmalloc+0x45/0x50 [ 1514.143974] ? bpf_prog_alloc+0xe3/0x3e0 17:20:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4b49, 0x0) [ 1514.143994] bpf_prog_alloc+0xe3/0x3e0 [ 1514.144014] ? bpf_prog_kallsyms_find+0x4a0/0x4a0 [ 1514.144031] ? selinux_capable+0x36/0x40 [ 1514.144056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.154153] ? security_capable+0x99/0xc0 [ 1514.154174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.154197] bpf_prog_load+0x435/0x1cc0 [ 1514.154219] ? bpf_prog_new_fd+0x60/0x60 [ 1514.154239] ? __might_fault+0x12b/0x1e0 [ 1514.154259] ? lock_downgrade+0x900/0x900 [ 1514.162282] ? lock_release+0xa00/0xa00 [ 1514.162298] ? perf_trace_sched_process_exec+0x860/0x860 [ 1514.162320] ? usercopy_warn+0x110/0x110 [ 1514.162349] ? selinux_bpf+0xe6/0x130 [ 1514.162366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.162385] __x64_sys_bpf+0x36c/0x520 [ 1514.196017] ? bpf_prog_get+0x20/0x20 [ 1514.196056] do_syscall_64+0x1b9/0x820 [ 1514.196072] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1514.196091] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1514.196108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1514.196129] ? trace_hardirqs_on_caller+0x310/0x310 [ 1514.205018] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1514.205038] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1514.205061] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1514.205085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.205098] RIP: 0033:0x457659 [ 1514.205117] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1514.236562] RSP: 002b:00007f6d39ecbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1514.236577] RAX: ffffffffffffffda RBX: 00007f6d39ecbc90 RCX: 0000000000457659 [ 1514.236586] RDX: 0000000000000048 RSI: 0000000020000440 RDI: 0000000000000005 [ 1514.236595] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1514.236604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d39ecc6d4 [ 1514.236613] R13: 00000000004bdb53 R14: 00000000004cd440 R15: 0000000000000003 [ 1514.347792] syz-executor3: vmalloc: allocation failure: 4096 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 1514.356507] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1514.414850] CPU: 0 PID: 29402 Comm: syz-executor3 Not tainted 4.20.0-rc6+ #152 [ 1514.422234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.422240] Call Trace: [ 1514.422264] dump_stack+0x244/0x39d [ 1514.422286] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1514.422312] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1514.422335] warn_alloc.cold.116+0xb7/0x1bd [ 1514.422355] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1514.434283] ? __get_vm_area_node+0x130/0x3a0 [ 1514.434301] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1514.434336] ? __get_vm_area_node+0x2e5/0x3a0 [ 1514.448735] __vmalloc_node_range+0x472/0x750 [ 1514.448770] ? find_held_lock+0x36/0x1c0 [ 1514.448805] __vmalloc+0x45/0x50 [ 1514.467449] ? bpf_prog_alloc+0xe3/0x3e0 [ 1514.467469] bpf_prog_alloc+0xe3/0x3e0 [ 1514.467489] ? bpf_prog_kallsyms_find+0x4a0/0x4a0 [ 1514.467506] ? selinux_capable+0x36/0x40 [ 1514.467528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.476502] ? security_capable+0x99/0xc0 17:20:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x40086602, 0x0) [ 1514.476523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.476547] bpf_prog_load+0x435/0x1cc0 [ 1514.483956] ? bpf_prog_new_fd+0x60/0x60 [ 1514.483978] ? __might_fault+0x12b/0x1e0 [ 1514.483996] ? lock_downgrade+0x900/0x900 [ 1514.484016] ? lock_release+0xa00/0xa00 [ 1514.491944] ? perf_trace_sched_process_exec+0x860/0x860 [ 1514.491981] ? usercopy_warn+0x110/0x110 [ 1514.492010] ? selinux_bpf+0xe6/0x130 [ 1514.492030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.506460] __x64_sys_bpf+0x36c/0x520 [ 1514.506477] ? bpf_prog_get+0x20/0x20 [ 1514.506511] do_syscall_64+0x1b9/0x820 [ 1514.516180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1514.516201] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1514.516217] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1514.516236] ? trace_hardirqs_on_caller+0x310/0x310 [ 1514.516255] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1514.524288] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1514.524312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1514.524336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.524352] RIP: 0033:0x457659 [ 1514.541931] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1514.541940] RSP: 002b:00007f6d39ecbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1514.541956] RAX: ffffffffffffffda RBX: 00007f6d39ecbc90 RCX: 0000000000457659 [ 1514.541966] RDX: 0000000000000048 RSI: 0000000020000440 RDI: 0000000000000005 [ 1514.541976] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1514.541985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d39ecc6d4 [ 1514.541999] R13: 00000000004bdb53 R14: 00000000004cd440 R15: 0000000000000003 [ 1514.553707] Mem-Info: [ 1514.677684] Dev loop0: unable to read RDB block 6 [ 1514.692283] active_anon:158929 inactive_anon:196 isolated_anon:0 [ 1514.692283] active_file:13086 inactive_file:44960 isolated_file:0 [ 1514.692283] unevictable:0 dirty:263 writeback:0 unstable:0 [ 1514.692283] slab_reclaimable:17183 slab_unreclaimable:121154 [ 1514.692283] mapped:55517 shmem:250 pagetables:2500 bounce:0 [ 1514.692283] free:1166628 free_pcp:781 free_cma:0 [ 1514.728816] Node 0 active_anon:635716kB inactive_anon:784kB active_file:52344kB inactive_file:179840kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222068kB dirty:1052kB writeback:0kB shmem:1000kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 217088kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 17:20:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1514.767385] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1514.793806] loop0: unable to read partition table [ 1514.800319] loop0: partition table beyond EOD, truncated [ 1514.805789] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1514.832252] lowmem_reserve[]: 0 2818 6321 6321 17:20:37 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:37 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x2, 0x0) [ 1514.853430] Node 0 DMA32 free:2887356kB min:30052kB low:37564kB high:45076kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2888780kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1424kB local_pcp:1352kB free_cma:0kB 17:20:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:37 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000cf07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1514.973534] lowmem_reserve[]: 0 0 3503 3503 [ 1514.982825] Node 0 Normal free:1772512kB min:37364kB low:46704kB high:56044kB active_anon:629484kB inactive_anon:784kB active_file:52344kB inactive_file:179840kB unevictable:0kB writepending:1052kB present:4718592kB managed:3587816kB mlocked:0kB kernel_stack:9024kB pagetables:9852kB bounce:0kB free_pcp:1692kB local_pcp:1212kB free_cma:0kB 17:20:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0xc0189436, 0x0) [ 1515.058671] lowmem_reserve[]: 0 0 0 0 [ 1515.062674] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1515.093273] Node 0 DMA32: 3*4kB (M) 2*8kB (M) 2*16kB (M) 4*32kB (M) 2*64kB (M) 3*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 1*2048kB (M) 703*4096kB (M) = 2887356kB [ 1515.109875] Node 0 Normal: 3002*4kB (UME) 6095*8kB (UME) 2045*16kB (UME) 1196*32kB (UME) 485*64kB (UME) 50*128kB (UME) 9*256kB (UME) 30*512kB (UME) 13*1024kB (UE) 6*2048kB (UM) 379*4096kB (UM) = 1764848kB [ 1515.150133] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1515.159864] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1515.169012] 58301 total pagecache pages [ 1515.173189] 0 pages in swap cache [ 1515.176797] Swap cache stats: add 0, delete 0, find 0/0 [ 1515.188353] Dev loop0: unable to read RDB block 6 [ 1515.194694] loop0: unable to read partition table [ 1515.202131] Free swap = 0kB [ 1515.206551] loop0: partition table beyond EOD, truncated [ 1515.218473] Total swap = 0kB [ 1515.219653] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1515.236396] 1965979 pages RAM [ 1515.254541] 0 pages HighMem/MovableOnly 17:20:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:37 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x80086601, 0x0) 17:20:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x7403000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:37 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1515.274853] 342853 pages reserved [ 1515.287631] 0 pages cma reserved [ 1515.358840] Dev loop0: unable to read RDB block 6 [ 1515.365298] loop0: unable to read partition table [ 1515.377921] loop0: partition table beyond EOD, truncated [ 1515.384392] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:38 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000001107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 17:20:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2100, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:38 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:38 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:38 executing program 3: bpf$PROG_LOAD(0x6, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1515.599077] Dev loop0: unable to read RDB block 6 [ 1515.607858] loop0: unable to read partition table [ 1515.615738] loop0: partition table beyond EOD, truncated [ 1515.637787] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:38 executing program 3: bpf$PROG_LOAD(0xe, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000380)=""/4096) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000100)=0x14000) getpeername$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) [ 1515.739540] Dev loop0: unable to read RDB block 6 17:20:38 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:38 executing program 3: bpf$PROG_LOAD(0x12, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1515.766911] loop0: unable to read partition table [ 1515.783684] loop0: partition table beyond EOD, truncated [ 1515.796662] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:38 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:38 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:38 executing program 3: bpf$PROG_LOAD(0xf, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:38 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2900, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:38 executing program 3: bpf$PROG_LOAD(0x8, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/dev/kvm\x00'}, {0x20, "242d766d6e6574305d657468312d2d70707030977d6c6f"}, {}], 0xa, "131cfe3e0684571566722b31fd35df85a8ab9ac3d2a0ab26d1caa81e0e19843ed4d2c09e03dddb22f2d26ecff60b20b28ae624eae74ed97a0c04ef637d21fcf32f5190319820e46617ecb431f8b160aaaead636c2496edee63c86c2ef9eca5fff92b20cb19a1f5590bae20bb285e2a145fecf062a553d8216a9313098b238b72fe34663b1707a3e48f004f16"}, 0xba) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1516.079112] Dev loop0: unable to read RDB block 6 [ 1516.088231] loop0: unable to read partition table [ 1516.098357] loop0: partition table beyond EOD, truncated [ 1516.106792] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:38 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:38 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1516.201105] Dev loop0: unable to read RDB block 6 [ 1516.211416] loop0: unable to read partition table [ 1516.238918] loop0: partition table beyond EOD, truncated 17:20:38 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r3, &(0x7f0000006f40)=[{{&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/79, 0x4f}, {&(0x7f0000000180)=""/209, 0xd1}, {&(0x7f0000000280)=""/158, 0x9e}, {&(0x7f0000000380)=""/180, 0xb4}], 0x4, &(0x7f0000000440)=""/242, 0xf2}, 0x2}, {{&(0x7f0000000540)=@xdp, 0x80, &(0x7f0000001b00)=[{&(0x7f00000005c0)=""/58, 0x3a}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/142, 0x8e}, {&(0x7f00000016c0)=""/74, 0x4a}, {&(0x7f0000001740)=""/174, 0xae}, {&(0x7f0000001800)=""/193, 0xc1}, {&(0x7f0000001900)=""/220, 0xdc}, {&(0x7f0000001a00)=""/69, 0x45}, {&(0x7f0000001a80)=""/115, 0x73}], 0x9, &(0x7f0000001bc0)=""/178, 0xb2}, 0xc98}, {{&(0x7f0000001c80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001d00)=""/188, 0xbc}, {&(0x7f0000001dc0)=""/188, 0xbc}, {&(0x7f0000001e80)=""/252, 0xfc}, {&(0x7f0000001f80)=""/36, 0x24}, {&(0x7f0000001fc0)=""/235, 0xeb}, {&(0x7f00000020c0)=""/247, 0xf7}], 0x6}, 0xc77}, {{&(0x7f0000002240)=@nfc, 0x80, &(0x7f0000004540)=[{&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/159, 0x9f}, {&(0x7f0000003380)=""/17, 0x11}, {&(0x7f00000033c0)=""/29, 0x1d}, {&(0x7f0000003400)=""/27, 0x1b}, {&(0x7f0000003440)=""/4096, 0x1000}, {&(0x7f0000004440)=""/10, 0xa}, {&(0x7f0000004480)=""/158, 0x9e}], 0x8, &(0x7f00000045c0)=""/25, 0x19}, 0x10001}, {{&(0x7f0000004600)=@ipx, 0x80, &(0x7f0000006ac0)=[{&(0x7f0000004680)=""/166, 0xa6}, {&(0x7f0000004740)=""/162, 0xa2}, {&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000005800)=""/144, 0x90}, {&(0x7f00000058c0)=""/158, 0x9e}, {&(0x7f0000005980)=""/93, 0x5d}, {&(0x7f0000005a00)=""/4096, 0x1000}, {&(0x7f0000006a00)=""/158, 0x9e}], 0x8, &(0x7f0000006b40)=""/212, 0xd4}, 0xfff}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000006e40)=[{&(0x7f0000006cc0)=""/72, 0x48}, {&(0x7f0000006d40)=""/166, 0xa6}, {&(0x7f0000006e00)=""/39, 0x27}], 0x3, &(0x7f0000006e80)=""/156, 0x9c}, 0x49cea5f8}], 0x6, 0x40, &(0x7f00000070c0)={0x77359400}) 17:20:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x16, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1516.260262] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:38 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004f07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:38 executing program 3: bpf$PROG_LOAD(0x7, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:38 executing program 3: bpf$PROG_LOAD(0x3, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1516.416871] FAT-fs (loop2): bogus number of reserved sectors [ 1516.433081] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x480040, 0x0) bind$vsock_dgram(r3, &(0x7f0000000200)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f00000000c0)=""/255) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x2, 0x8, 0x2}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000380)={r5, 0x41}, &(0x7f00000003c0)=0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r7 = getpid() kcmp(r6, r7, 0x2, r1, r0) 17:20:39 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1516.489316] FAT-fs (loop2): bogus number of reserved sectors [ 1516.495147] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1516.501753] Dev loop0: unable to read RDB block 6 [ 1516.520916] loop0: unable to read partition table 17:20:39 executing program 3: bpf$PROG_LOAD(0xb, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1516.540389] loop0: partition table beyond EOD, truncated [ 1516.540424] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x45f, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:39 executing program 3: bpf$PROG_LOAD(0x14, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:39 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1516.670235] Dev loop0: unable to read RDB block 6 [ 1516.683900] loop0: unable to read partition table [ 1516.693281] loop0: partition table beyond EOD, truncated [ 1516.704847] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:39 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:39 executing program 3: bpf$PROG_LOAD(0x11, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1516.715071] FAT-fs (loop2): bogus number of reserved sectors [ 1516.721959] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x8200, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000280)={r5, 0x40}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000180)={0x9, 0x1, 0x3, 0x3, r5}, 0x10) sendmsg$inet_sctp(r3, &(0x7f0000000640)={&(0x7f00000002c0)=@in6={0xa, 0x4e20, 0x800, @remote, 0x3f}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000300)="bb7545d82517b976ca2573a0666065a42b0337c8", 0x14}, {&(0x7f0000000380)="ad0a3cde215cffe3c9c87130042ae2050026736c013f6c039387491a1d17c06c1b568ae2b4af7bca7e0dd2c5c4199b05207f4a637c57517a10edc8bbce5804eec0827e5348a1ead80d86982f1c9275bdedd9b5f5bd4c9978014a7e81ad1f6f06526734891222c581d9435a1559187b6418edf5bad2f67d97debe8ed1abdb81f6a9e777c5f37846a169abcba90e9d09a44bb01ed5a3633455b6a052316b48", 0x9e}, {&(0x7f0000000440)="5d8050409f112afa3581a5f1bd86b2c61438577c3c0bdef90d99c2eba69a10349638d5b837aa4e1447bb106c87cdc846b855eb5cdd7165bfbf5f16eb257e31a4930aa52180156088e4ffdc844a9ecc09d0fdff36cdcb588a409bd3cc7d082ef932ee74df8a8661d21c239c70b7f0c07f975a9af4444d8a909341a6da4c29066e52d804325a236da5b342eccb3e1756ff453f509c4eecebef680d26454bf161a9df0a5819ef3708a3b2c84ee193f571d063a13b281aed25c14240ca8872fa686fd932190efe9aea71a88c053a671122c74661b0e350b965bafafeff95107bf722bf34e40fb43146a9c0a0cb04a275c0e0", 0xf0}], 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="20fc5c00000000008400000002000000070000800000000000040000e8442fa20646c116e9d3b182b7e180dc1e43859198110f7d565e7e3386c908196a0fe0c77d056539f95b7ec9451fa9783a26d634767130f7054868b545a09a74a100014f45c2ffe38df5ad00a64c5d05682bce53aabe7955db0d41c29728fdb6ed327244f56b78fa8ee34533587a012e72bbc3a91dfad32d785129155f5e1b38738cc0c31930159b766c23b03b612e4133717b6e23099136435eb1d0486b46ccfb4f30ba4bc64ca08870209ca5b5a2495e1c9e67bb978a000000", @ANYRES32=r5, @ANYBLOB="18000000000000008400000007000000ac14140f000000001800000000000000840000000000000003000700040000001800000000000000840000000700000000000000000000001800000000000000840000000600000000000000000000001800000000000000840000000000000001000100ff030600"], 0x98, 0x40011}, 0x40000) lsetxattr$security_capability(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x8, 0x5}, {0xffffffffffffffe7, 0x100000000}], r4}, 0x18, 0x3) 17:20:39 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1516.819300] FAT-fs (loop2): bogus number of reserved sectors [ 1516.834417] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:39 executing program 3: bpf$PROG_LOAD(0x4, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:39 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) [ 1516.958328] Dev loop0: unable to read RDB block 6 [ 1516.977757] loop0: unable to read partition table 17:20:39 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18010000", @ANYRES16=r1, @ANYBLOB="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"], 0x118}}, 0x4000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) 17:20:39 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:39 executing program 3: bpf$PROG_LOAD(0x25, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1516.999098] loop0: partition table beyond EOD, truncated [ 1517.028045] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x15000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:39 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:39 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) [ 1517.138975] Dev loop0: unable to read RDB block 6 [ 1517.146237] loop0: unable to read partition table [ 1517.162364] loop0: partition table beyond EOD, truncated [ 1517.176976] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000080)=0x5) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) [ 1517.199254] FAT-fs (loop2): bogus number of reserved sectors [ 1517.210588] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:39 executing program 3: bpf$PROG_LOAD(0x2, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:39 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000a00ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1517.286668] FAT-fs (loop2): bogus number of reserved sectors 17:20:39 executing program 3: bpf$PROG_LOAD(0x9, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1517.328135] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:39 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffff9c, 0xfffffffffffffffd}) 17:20:39 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1400, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:40 executing program 3: bpf$PROG_LOAD(0xc, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1517.448492] Dev loop0: unable to read RDB block 6 [ 1517.453406] loop0: unable to read partition table [ 1517.474974] loop0: partition table beyond EOD, truncated 17:20:40 executing program 3: bpf$PROG_LOAD(0xd, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1517.499069] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) bind$bt_l2cap(r2, &(0x7f0000000200)={0x1f, 0x6, {0x800, 0x3, 0x4, 0x3ff, 0x4, 0x11dcc746}, 0x47, 0x600000000000000}, 0xe) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r4 = syz_open_dev$audion(&(0x7f0000006280)='/dev/audio#\x00', 0x1, 0x4000) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000000c0)={0x0, r3, 0x9, 0x5, 0x2, 0x6}) fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x6}]}, 0xc, 0x2) write$FUSE_POLL(r4, &(0x7f0000000240)={0x18, 0x0, 0x4, {0x200}}, 0x18) getsockopt$inet_buf(r4, 0x0, 0x0, &(0x7f00000062c0)=""/181, &(0x7f0000006380)=0xb5) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) getsockname(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000180)=0x80) setsockopt$inet_dccp_int(r4, 0x21, 0xf, &(0x7f0000000280)=0x2, 0x4) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) 17:20:40 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:40 executing program 3: bpf$PROG_LOAD(0x13, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1517.608535] Dev loop0: unable to read RDB block 6 [ 1517.613600] loop0: unable to read partition table [ 1517.622587] loop0: partition table beyond EOD, truncated [ 1517.632586] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:40 executing program 3: bpf$PROG_LOAD(0x10, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:40 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01002000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:40 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000080)={0xa, @output={0x1000, 0x1, {0xffffffffffffffff, 0x4}, 0x10001, 0x5}}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x12, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1517.911788] device nr0 entered promiscuous mode [ 1517.925697] FAT-fs (loop2): bogus number of reserved sectors [ 1517.937299] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1517.948176] Dev loop0: unable to read RDB block 6 [ 1517.956578] loop0: unable to read partition table [ 1517.973486] loop0: partition table beyond EOD, truncated [ 1517.990038] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x16, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1518.021332] FAT-fs (loop2): bogus number of reserved sectors [ 1518.044968] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:40 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1518.148808] Dev loop0: unable to read RDB block 6 [ 1518.157970] loop0: unable to read partition table [ 1518.181868] loop0: partition table beyond EOD, truncated [ 1518.197453] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:41 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:41 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:41 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:41 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x880, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xf, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1518.632619] FAT-fs (loop2): bogus number of reserved sectors [ 1518.646756] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x3fff, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe8, r4, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4010000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xc0000000000}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5e6}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7c55}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7d01}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x810}, 0x4000) [ 1518.688373] Dev loop0: unable to read RDB block 6 [ 1518.697440] loop0: unable to read partition table [ 1518.719541] FAT-fs (loop2): bogus number of reserved sectors [ 1518.725621] loop0: partition table beyond EOD, truncated 17:20:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1518.738165] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1518.745073] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:41 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x2, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1518.863107] Dev loop0: unable to read RDB block 6 [ 1518.881018] device nr0 entered promiscuous mode [ 1518.886115] loop0: unable to read partition table [ 1518.903559] loop0: partition table beyond EOD, truncated [ 1518.936976] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:41 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x5, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) socketpair(0x8, 0xb, 0x10000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x9, 0xbf7, 0xa9, 0x1d, 0x61, 0xfffffffffffffffd, 0xffffffff, {0x0, @in6={{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x17}, 0x6}}, 0xc2ac, 0x2a8000000000000, 0xe43, 0x80000000, 0x81}}, &(0x7f0000000140)=0xb0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000240)=0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfff, 0xffffffffffff0001, 0x4, 0x80, 0x0, 0x66f8, 0x1, 0x0, 0x80000000, 0x8, 0x8, 0x5, 0x0, 0x5, 0x2, 0x10001, 0x0, 0xffff, 0x6, 0x100000000, 0x10001, 0x7fffffff, 0x3f, 0x0, 0xf8, 0x1, 0x2, 0x200000000000, 0x2, 0x2, 0x8, 0x0, 0x3e4, 0x1000, 0x7f, 0x401, 0x0, 0x100000000, 0x0, @perf_config_ext={0x2, 0x8}, 0x1000, 0x1, 0xffff, 0x0, 0x0, 0x5, 0xc06}, r5, 0xffffffffffffffff, r6, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000280)={0x0, 0xffffffffffffff32, 0x0, 0x5, 0x7fff, 0x4, 0x7, 0x9, r4}, 0x20) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:41 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000001fc07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:41 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x16000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x6, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1519.418150] Dev loop0: unable to read RDB block 6 [ 1519.423310] loop0: unable to read partition table [ 1519.442573] FAT-fs (loop2): bogus number of reserved sectors [ 1519.442715] loop0: partition table beyond EOD, truncated 17:20:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x100) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000080)={0x1}) [ 1519.462764] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1519.465838] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0xa, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1519.549769] FAT-fs (loop2): bogus number of reserved sectors [ 1519.561753] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1519.588673] Dev loop0: unable to read RDB block 6 [ 1519.593764] loop0: unable to read partition table 17:20:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) bind$vsock_stream(r3, &(0x7f0000000080), 0x10) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1519.622388] loop0: partition table beyond EOD, truncated [ 1519.645609] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:42 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2200, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1519.669103] device nr0 entered promiscuous mode 17:20:42 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0xb, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:42 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000003c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:42 executing program 1: r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)=0x200) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x3, &(0x7f0000000080)=0x4) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000180)={0x4, r3, 0x1}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) 17:20:42 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1d00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x20001, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1520.168621] Dev loop0: unable to read RDB block 6 [ 1520.173629] loop0: unable to read partition table [ 1520.189159] loop0: partition table beyond EOD, truncated [ 1520.206381] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 17:20:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5f04000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x55, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1520.339086] Dev loop0: unable to read RDB block 6 [ 1520.344004] loop0: unable to read partition table [ 1520.374660] loop0: partition table beyond EOD, truncated 17:20:42 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x7d, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1520.387584] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1520.440481] device nr0 entered promiscuous mode 17:20:43 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() tkill(r2, 0x14) rt_sigqueueinfo(r2, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x80000000}) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x6, 0x488000) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f00000000c0)={0x9e95, 0x101, 0x81, 0x15, 0x4}) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) 17:20:43 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x71, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:43 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x5, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffd5, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1520.928774] Dev loop0: unable to read RDB block 6 [ 1520.933856] loop0: unable to read partition table [ 1520.939075] loop0: partition table beyond EOD, truncated [ 1520.951912] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x7403, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x6b, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x54, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1521.078769] Dev loop0: unable to read RDB block 6 [ 1521.083820] loop0: unable to read partition table [ 1521.097331] device nr0 entered promiscuous mode [ 1521.100016] loop0: partition table beyond EOD, truncated [ 1521.117003] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:43 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:44 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r4 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000100)={0x401, 0x4, 0x4, 0x200000, {r2, r3/1000+30000}, {0x5, 0x0, 0xdd9, 0x6, 0x200, 0x0, "e60d2bcf"}, 0x7f, 0x6, @fd=r4, 0x4}) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000180)={0x3, 0x5}) ioctl$KVM_CREATE_DEVICE(r5, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r6, 0x4018aee2, 0x0) 17:20:44 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffcf, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:44 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x62040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000004c0)={r2, 0x105, "c31c086bde8edfc4498cb533fd59aa7de38d43e04ea195265b7a1a41e679e8e2c10e38725164aa642803bf9e46071b06b54d24368020cd5286a7f211634a9c482c202d1a69a199ca2472e454f2ce8f0fbb32e0c452c781a115731afdfc7526cbcc0022c4143cca65b86b292845bc1791b6f266a5b10211e50509675ea222a2c98a6ae4bb980c181d1610e57dbc93fc7e935c0e96d9470d691939889d1c03214aff5134f9be7f2873acebaeaa2253398179d64c6a8826f50cb84b18f076339105d9a4e838566671dda994404528a0aaf9cdb10f072d8a61dc6b1a50bb2e5233c703d418cd2e8fa1b9d88eb7404eff84562da38db9d9c6b23cf8752b19863c2e77bd01423cba"}, &(0x7f0000000200)=0x10d) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)) fadvise64(r0, 0x0, 0x8, 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000100)=r4) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0xfffffffffffffffe, 0x94082) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee2, 0x0) 17:20:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffa7, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1521.778208] Dev loop0: unable to read RDB block 6 [ 1521.783251] loop0: unable to read partition table 17:20:44 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1521.826837] loop0: partition table beyond EOD, truncated [ 1521.834777] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000100)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = getpid() rt_sigqueueinfo(r3, 0x30, &(0x7f0000000080)={0x25, 0x7f, 0x1}) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r5 = shmget$private(0x0, 0xb000, 0x54000000, &(0x7f0000ff2000/0xb000)=nil) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000740)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xffffff47) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @empty}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000580)={{0x8, r6, r7, r8, r9, 0x80, 0x4}, 0x8, 0x6, 0x2, 0x17751710, r3, r3, 0x1000}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x100, 0x0) 17:20:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x5f, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1521.958326] Dev loop0: unable to read RDB block 6 [ 1521.970307] loop0: unable to read partition table 17:20:44 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1521.998606] loop0: partition table beyond EOD, truncated [ 1522.017297] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1522.048567] device nr0 entered promiscuous mode 17:20:44 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r3 = semget(0x3, 0x3, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x6, r2, 0x1}) 17:20:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffdd, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5b04000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x37, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1522.208734] Dev loop0: unable to read RDB block 6 [ 1522.213774] loop0: unable to read partition table [ 1522.233825] loop0: partition table beyond EOD, truncated 17:20:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={r4, r5, r6}, 0xc) [ 1522.254198] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:44 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1522.378604] Dev loop0: unable to read RDB block 6 [ 1522.383623] loop0: unable to read partition table [ 1522.395138] loop0: partition table beyond EOD, truncated [ 1522.407926] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:45 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffdb, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x20001, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x33}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, r0}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:20:45 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01070000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:45 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2900000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x5c, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) [ 1522.798074] Dev loop0: unable to read RDB block 6 [ 1522.803074] loop0: unable to read partition table [ 1522.818329] loop0: partition table beyond EOD, truncated [ 1522.829833] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffc7, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x77, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1522.960831] Dev loop0: unable to read RDB block 6 [ 1522.976365] loop0: unable to read partition table [ 1522.990114] device nr0 entered promiscuous mode [ 1523.000060] loop0: partition table beyond EOD, truncated 17:20:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000080)={[{0x1, 0x3, 0x23, 0xfffffffffffffffa, 0x3, 0x401, 0x5, 0x15f59c00, 0x3, 0x9, 0x4, 0x6, 0x1}, {0x10000, 0x0, 0xfff, 0x60d, 0x7, 0x8001, 0x2, 0x7, 0x8, 0x6ca7, 0x4000000000000000, 0x7f, 0x7f}, {0x81, 0x1, 0x1, 0x6, 0x9, 0x8, 0x7996, 0x400, 0x8000, 0x8, 0x100000001, 0x7, 0x4}], 0x9}) 17:20:45 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1523.019236] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:46 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:46 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005d07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x79, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000100)={{0x80, 0x14d8aae0}, 'port0\x00', 0x10, 0x16, 0x8, 0xfffffffffffffff5, 0x3, 0x595, 0x8, 0x0, 0x1, 0x3f00000000000000}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000080)=0x9, 0x4) 17:20:46 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffbd, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1523.549275] Dev loop0: unable to read RDB block 6 [ 1523.556668] loop0: unable to read partition table [ 1523.567381] loop0: partition table beyond EOD, truncated [ 1523.573088] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x111000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f0000000140)={r4, 0x2}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f00000000c0)={r5, 0x3}) 17:20:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x6f, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2600000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1523.688256] Dev loop0: unable to read RDB block 6 [ 1523.693287] loop0: unable to read partition table [ 1523.717388] loop0: partition table beyond EOD, truncated [ 1523.733499] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40040, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x1, r2, 0xfffffffffffffffe}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:20:46 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1523.780668] device nr0 entered promiscuous mode 17:20:46 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8947, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff84, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:46 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000b107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x3, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x6, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:46 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x461, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x61, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3, 0xa100) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x1996}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0xfffffffffffff4e4, 0xf980, 0x200, 0x1, 0x1000, 0x6, 0x8001, 0xfffffffffffff3d9, r2}, &(0x7f0000000180)=0x20) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r5 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x2080) ioctl$KIOCSOUND(r5, 0x4b2f, 0x7ff) openat$cgroup_type(r1, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) [ 1524.388887] Dev loop0: unable to read RDB block 6 [ 1524.394135] loop0: unable to read partition table [ 1524.405778] loop0: partition table beyond EOD, truncated 17:20:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x5d, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1524.437088] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000080)={0x7, 0x70, 0x6, 0x7b5adf47, 0x619e, 0xd21, 0x0, 0x0, 0x60008, 0x1, 0xffff, 0x7f, 0x0, 0x4, 0x3f, 0x3, 0x5a35, 0x8001, 0x9, 0x7fffffff, 0x6, 0x2280000000000000, 0x1ff, 0x1, 0x6, 0x8001, 0x5, 0xfffffffffffffff9, 0x4, 0x7, 0xae46, 0x8, 0x389, 0xfffffffffd3c96e4, 0x0, 0x7, 0x7fff, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x6}, 0x10008, 0x5, 0x80000000, 0x7, 0x9f4, 0x3, 0x7}) 17:20:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffbc, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1524.504731] device nr0 entered promiscuous mode [ 1524.548524] Dev loop0: unable to read RDB block 6 [ 1524.569999] loop0: unable to read partition table [ 1524.596949] loop0: partition table beyond EOD, truncated [ 1524.611885] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:47 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:47 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x3c, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:47 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x50000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @local}]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x11, r1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000500)={'team0\x00', r4}) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 17:20:47 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffcd, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1525.144789] audit: type=1400 audit(1544808047.711:474): avc: denied { map } for pid=30028 comm="syz-executor1" path="/proc/sys/net/ipv4/vs/drop_packet" dev="proc" ino=524542 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file permissive=1 [ 1525.180726] FAT-fs (loop2): bogus number of reserved sectors [ 1525.207612] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100000000fe) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f00000001c0)={0xd188, 0xfffffffffffffffd}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x6f, "b87643cd174d36bee4abf6c86c7a970afa1218c9a1d35e56369755b85f356067395e28084999d4669c10e4fbe1497afdfa60a9f18e6a90c1ceb2427c0ac4116b2399a7a3768904d54d045ddc60589408c5fbdd1067d3240b02af5ff7b1b8154d218a058ef905524f6f58f835af2980"}, &(0x7f0000000100)=0x77) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000140)={r3, 0x7}, 0x8) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000200)="0b9c08ec3b4e1334e8422802e06ff0cffc0f9f063205179a6a71715178c59dadd272e869c6a6048a515ee540d4f263a45e908700a1eb26a0c57ffba1956e4cfd29de80f5657ad395f8f2c25ed519c1d9c0a8523fcf6608143762b88a117ea5d8f32573c5cdee006ffb") ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000180)) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) 17:20:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x6d, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1525.258665] Dev loop0: unable to read RDB block 6 [ 1525.265090] loop0: unable to read partition table [ 1525.287374] loop0: partition table beyond EOD, truncated [ 1525.292993] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1525.355839] device nr0 entered promiscuous mode 17:20:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2800, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:48 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x7b, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1525.409102] Dev loop0: unable to read RDB block 6 [ 1525.414135] loop0: unable to read partition table [ 1525.426257] loop0: partition table beyond EOD, truncated [ 1525.446258] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:48 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:48 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009607000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x4d, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:48 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1526.018318] Dev loop0: unable to read RDB block 6 [ 1526.023419] loop0: unable to read partition table [ 1526.043035] loop0: partition table beyond EOD, truncated [ 1526.046804] FAT-fs (loop2): bogus number of reserved sectors [ 1526.055822] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff9c, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:48 executing program 1: clock_adjtime(0x7, &(0x7f0000000080)={0x9, 0x80, 0x4, 0x9bed, 0x6b, 0x1, 0x6, 0x3, 0x14, 0x40, 0xfffffffffffffff8, 0x755, 0x3, 0x20, 0x0, 0x2, 0x9, 0x10000, 0x2, 0xfff, 0x51, 0x64, 0x5, 0x80000001, 0xfffffffffffffff8, 0x2}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e20, @local}, {0x2, 0x4e20, @loopback}, 0x80, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)='bond_slave_1\x00', 0xffffffffffffffff, 0x1e0d2ce9, 0x7}) [ 1526.062112] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x47, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1526.128027] FAT-fs (loop2): bogus number of reserved sectors [ 1526.146722] device nr0 entered promiscuous mode [ 1526.159717] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1526.188611] Dev loop0: unable to read RDB block 6 [ 1526.193687] loop0: unable to read partition table [ 1526.204452] loop0: partition table beyond EOD, truncated [ 1526.215723] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:48 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:48 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000001a07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1526.438728] Dev loop0: unable to read RDB block 6 [ 1526.446292] loop0: unable to read partition table [ 1526.459460] loop0: partition table beyond EOD, truncated [ 1526.473032] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:49 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x24, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:49 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x10001, 0x4}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r4, 0x7ff, 0x200, 0x62, 0x5, 0x100000001}, 0x14) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:20:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x19000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1526.640937] Dev loop0: unable to read RDB block 6 [ 1526.647106] loop0: unable to read partition table [ 1526.653474] loop0: partition table beyond EOD, truncated [ 1526.669137] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:49 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000d507000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff94, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1526.791733] FAT-fs (loop2): bogus number of reserved sectors [ 1526.800249] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x35, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1526.862135] device nr0 entered promiscuous mode [ 1526.868832] FAT-fs (loop2): bogus number of reserved sectors [ 1526.874661] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x4c, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x14000, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x8000) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, r2}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:20:49 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1526.928721] Dev loop0: unable to read RDB block 6 [ 1526.933830] loop0: unable to read partition table [ 1526.960260] loop0: partition table beyond EOD, truncated [ 1527.005325] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1527.055896] FAT-fs (loop2): bogus number of reserved sectors [ 1527.087446] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1527.118247] Dev loop0: unable to read RDB block 6 [ 1527.123262] loop0: unable to read partition table [ 1527.133659] loop0: partition table beyond EOD, truncated [ 1527.145267] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000080)) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x64, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:50 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000e507000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:50 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:50 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1527.420211] FAT-fs (loop2): bogus number of reserved sectors [ 1527.426050] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5804, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffcc, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1527.548093] Dev loop0: unable to read RDB block 6 [ 1527.556765] loop0: unable to read partition table [ 1527.577678] loop0: partition table beyond EOD, truncated 17:20:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000080)={0x1}) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000100)={0x0, 0x7fff, 0x5, &(0x7f00000000c0)}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) [ 1527.603998] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1527.711443] device nr0 entered promiscuous mode [ 1527.729069] Dev loop0: unable to read RDB block 6 [ 1527.737744] loop0: unable to read partition table 17:20:50 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfff, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, r2}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:20:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2a, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1527.757052] loop0: partition table beyond EOD, truncated [ 1527.778558] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x15, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:50 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009207000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x2, 0x400) accept4$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x14, 0x800) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000580)={r2, 0x1, 0x6}, 0x10) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000100)={0x4, 0xffffffffffffffff}) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000080)={0x5, 0x0, 0x7}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) 17:20:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffaf, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1528.014210] Dev loop0: unable to read RDB block 6 [ 1528.027169] loop0: unable to read partition table [ 1528.062132] loop0: partition table beyond EOD, truncated [ 1528.087296] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1528.290360] Dev loop0: unable to read RDB block 6 [ 1528.295406] loop0: unable to read partition table [ 1528.308163] loop0: partition table beyond EOD, truncated [ 1528.315522] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:50 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x4, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:50 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1e00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:50 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005f07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x2d, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:51 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee2, 0x0) 17:20:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffa5, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1528.529944] Dev loop0: unable to read RDB block 6 [ 1528.537596] loop0: unable to read partition table [ 1528.559880] loop0: partition table beyond EOD, truncated [ 1528.565878] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10002, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000080)={@multicast1, @rand_addr=0xaa}, 0x8) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) getsockname$unix(r2, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 17:20:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x22260000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:51 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1528.678800] Dev loop0: unable to read RDB block 6 [ 1528.683890] loop0: unable to read partition table [ 1528.709891] device nr0 entered promiscuous mode [ 1528.720889] loop0: partition table beyond EOD, truncated [ 1528.742005] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:51 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x62, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:51 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000380)={'filter\x00', 0x1000, "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"}, &(0x7f00000001c0)=0x1024) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)='trusted.overlay.opaque\x00', &(0x7f0000001480)='y\x00', 0x2, 0x1) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x3ffc, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000100)={r5, 0x29, "b8c322ebf62c7b479fafde9680c16ca24dff9d69a6d516cf8e882dc1694c9aa9b5736271e284e4cbd1"}, &(0x7f0000000140)=0x31) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) fcntl$addseals(r0, 0x409, 0x1) modify_ldt$read(0x0, &(0x7f00000014c0)=""/194, 0xc2) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000200)={0xb, @raw_data="9b52128e71c4e6059252e4a1cc11503631f8223d725bdd44948db47ae0c62551aa7b7fc9af6e7d1e7e63495108b0678ad3a75e8c10a1d50971effcf31af5cb89f5b1740265ecfac6f3d413bf1186d4c02adf5b60125ede07a1f82599cc917e33f6e3102140c508cff73f1808c7854da9e128cede5ea34c1a64d1e5617413b92ded994bb68ce8795c95f061b0e934d47a0f4c6af451d4f59515bbe8bb4151ed51016f168dd63dab093c5aedd7f3b207629b8c7622735374386356e72478e9b7077b90a8f092b9d553"}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000300)={r6, 0xff, 0x4, [0xfffffffffffff801, 0x0, 0x8001, 0x1]}, &(0x7f00000013c0)=0x10) 17:20:51 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000b907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:51 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x74, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1529.269506] Dev loop0: unable to read RDB block 6 [ 1529.279636] loop0: unable to read partition table [ 1529.298841] loop0: partition table beyond EOD, truncated 17:20:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="e9ffffff7e496c08103b3b1d85434f0e8d10d7260fa821f08db911ce86b3b0c30d21a80054d51b9b9a3b27d7a99e9d730d56eeccc0bd0d9c716e"], &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x4}, 0x8) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x98b, 0x2000) connect$tipc(r3, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x42}}}, 0x10) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee2, 0x0) [ 1529.317387] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffac, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1529.433476] device nr0 entered promiscuous mode [ 1529.448720] Dev loop0: unable to read RDB block 6 [ 1529.456137] loop0: unable to read partition table [ 1529.465244] FAT-fs (loop2): bogus number of reserved sectors 17:20:52 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000380)=0x0) setresuid(r1, r2, r3) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee2, 0x0) [ 1529.479282] loop0: partition table beyond EOD, truncated [ 1529.501274] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1529.509177] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1529.567843] FAT-fs (loop2): bogus number of reserved sectors [ 1529.583990] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:52 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xc, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:52 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004607000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:52 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 17:20:52 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff4, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000002c0)={0x4, 0xffffffffffffffff}) mq_unlink(&(0x7f0000000000)='\x00') ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x141041, 0x0) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) write$sndseq(r3, &(0x7f00000004c0)=[{0xffffffff, 0x20, 0x3f, 0x7, @time={0x0, 0x1c9c380}, {0x6, 0x5}, {0x3, 0xa9}, @addr={0x3, 0x7}}, {0x3, 0x1, 0x2, 0x6, @tick=0xda8, {0xfffffffffffffffd}, {0x53ce}, @result={0x8, 0x2}}, {0x43ee, 0x1, 0x2, 0x4000000000000000, @time={0x0, 0x989680}, {0x1, 0x4}, {0x1ff, 0xff}, @quote={{0x8, 0x3}, 0x1, &(0x7f0000000340)={0x8, 0x3, 0x7fffffff, 0x3, @time={0x0, 0x1c9c380}, {0x3, 0xb08}, {0x7, 0x1000}, @raw32={[0xfff, 0xfffffffffffffeff, 0xffffffffffff8654]}}}}, {0x2, 0x2, 0x5, 0x80, @tick=0xea5a, {0x100000000, 0x400}, {0x0, 0x10001}, @time=@tick=0x6}, {0x93, 0x7, 0x1, 0x4, @time={r4, r5+10000000}, {0xc5c, 0x1ff}, {0x39a, 0x401}, @connect={{0x100000001, 0x800}, {0x2, 0x78e}}}], 0xf0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000100)=""/189, 0xbd}, {&(0x7f00000001c0)=""/106, 0x6a}], 0x4, 0x0) r6 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x1, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f00000005c0)="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") 17:20:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x7a, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1530.068392] Dev loop0: unable to read RDB block 6 [ 1530.077507] loop0: unable to read partition table [ 1530.094116] loop0: partition table beyond EOD, truncated [ 1530.106375] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0xfffffffffffffffc, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1530.228489] Dev loop0: unable to read RDB block 6 [ 1530.236450] loop0: unable to read partition table 17:20:52 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1530.277295] loop0: partition table beyond EOD, truncated [ 1530.279106] device nr0 entered promiscuous mode [ 1530.282829] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1530.354768] FAT-fs (loop2): bogus number of reserved sectors [ 1530.376482] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1530.439278] FAT-fs (loop2): bogus number of reserved sectors [ 1530.445108] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:53 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x2002) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000080)=""/192) 17:20:53 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000a507000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffdc, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:53 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x16000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1530.807116] FAT-fs (loop2): bogus number of reserved sectors [ 1530.821323] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1530.838466] Dev loop0: unable to read RDB block 6 [ 1530.843582] loop0: unable to read partition table 17:20:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) r2 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getgroups(0x8, &(0x7f0000001780)=[0xee00, 0x0, 0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r5 = getpgid(0xffffffffffffffff) lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880)={0x0, 0x0, 0x0}, &(0x7f00000018c0)=0xc) r8 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0}, &(0x7f0000001940)=0xc) getgroups(0x3, &(0x7f0000001980)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r11 = gettid() r12 = geteuid() getresgid(&(0x7f00000019c0), &(0x7f0000001a00)=0x0, &(0x7f0000001a40)) sendmsg$unix(r1, &(0x7f0000001b80)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000000180)="c7c4354c00a43798e9eb50a0edb9ec0035ab8fb28b16a0a79d933909c94dd1e2e02bd3104c", 0x25}, {&(0x7f00000001c0)="f4990d5f983b004a8add89f3925d0a200fc089d0c61bbd21a240d1fbeaab14e7e8ff56e7d2a00e7c386ada9d1690de59ff5f75df4af7a99e95a83638e67197f44ebf18b0fb55bd331d168d588e36e1e7c2f158106758f8a8ba91f0f134754a9ef52ec50e315f6025eeaf863c4d7d27856cb8a2bcd696369c5992792c952afd54fea29943408d2ad31408ff09eca3781b0b58c8e0c462936b916e90f1c80ae3d32e5b917de08ec20b4d0c98573f4899d021cbc78c9fc72b311be710c545decb94a7e835bf", 0xc4}, {&(0x7f0000000380)="524ceed3b72815f9c63980ecceebaaa99273bc92fec2e20099e71bbe6d4e1ec93bd5ad959a8c090a8effe57ddbcdb977bd003d27393d3ca84644e1ca170e69b7ff343b946ff16ac3829b786f47eea73a6ed7a40fb993b9e67a3c467782f7ae3e22297a170917dd6c231d2c13b5f4c731f18f6fefc6755617adff6fd470c40aa441e0e5168d3f8e6fc6fc52b20e7be2328cbd71884bb1a6c2122a61d824b1541041422ee713e3b5f7c6083becc3bb65ec223ae60b824db2c7eee371bf0b2d8f827fd1a9266f8b1e25fab655f3ba0ab0badc2b18358aaafcc28704a8927909e8a1a382ed52db43f3247d327ff7c2ae98c843795f", 0xf3}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="d8fc58318bfe1ebb20ede9485772b4e18a92930279094a831af38e5d822a8d90f271e15289405e5d78020a96ea243d52d970a6209b0133991ad802509593f3ef16c1af79768d3e4b3bb330ad956a6b8edaa6d45c271b8a1e78f37046d93ca92694251051143f7ccf8c5b190dedcea38362da352f3d8e3b624e8a41d334a71edc098ac2a4be63296342", 0x89}, {&(0x7f0000001540)="d7056f9a5e657013bce45204840a907d10a493b250e6ff8b748a2b6a5598e5b330d92113660723386e9396adf480f4f0535544c22e1633e76f384dc97d31e49d495bdf1b3df48cea79a90c430d33544703ffcdb4f226310dc70de8517c5637ad9416f11fe2a9a42781f396cdc1efc7f72628cfc1a759d0bf6dede9d21eccb2033ccb0438a598d23f259ffb682477955dd355021557f5e67e6701", 0x9a}, {&(0x7f00000002c0)="45e6dcc77d61ec589dc5a349b45ff36238194c9a0665ede1e21abff2b6ad90510b70d5cfd24811", 0x27}], 0x7, &(0x7f0000001a80)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00e4ffff2f000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='@\x00\x00\x00'], 0xf0, 0x8000}, 0x40000) r14 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r14, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r15, 0x4018aee2, 0x0) 17:20:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x2c, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1530.857121] loop0: partition table beyond EOD, truncated [ 1530.873431] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1530.906517] FAT-fs (loop2): bogus number of reserved sectors [ 1530.916119] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x7c, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5904, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:53 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1531.035093] device nr0 entered promiscuous mode [ 1531.045287] Dev loop0: unable to read RDB block 6 [ 1531.059346] loop0: unable to read partition table [ 1531.079296] loop0: partition table beyond EOD, truncated [ 1531.088175] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:54 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:20:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x73, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x40, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0xc02) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 17:20:54 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008b07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:54 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x72, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = add_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="c36e2a9c8a6741d937b68629a36eaff7e9138cdee9c1b73b0b389852fcee74fd4476e92d3c43c17ac33e6a0dada0728540caaffd21509bfd26480d16b9c2340c61e6d26c856180a42e486bf4a22240a33f541e8583a7e50e4d35ccbc5ae85cf107b7f69bcd07c1ce725336298fd24f1b2d986021d0ad0fc77ca33e7966eac9a36f3fbba51011dba2537b01b4c95e2899d294c43f3d6f89aff337895f5bb86577263908e9061d3425963c79b5b34ba1bdc0341edf4409", 0xb6, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='/dev/kvm\x00', r2) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) [ 1531.608300] Dev loop0: unable to read RDB block 6 [ 1531.613357] loop0: unable to read partition table [ 1531.627532] loop0: partition table beyond EOD, truncated [ 1531.633273] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x25, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1531.719378] Dev loop0: unable to read RDB block 6 [ 1531.724861] loop0: unable to read partition table [ 1531.741015] loop0: partition table beyond EOD, truncated [ 1531.756763] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:54 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1531.780911] device nr0 entered promiscuous mode 17:20:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1600000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:54 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1531.978260] Dev loop0: unable to read RDB block 6 [ 1531.985767] loop0: unable to read partition table [ 1531.998571] loop0: partition table beyond EOD, truncated [ 1532.013245] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:54 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) fgetxattr(r0, &(0x7f0000000080)=@random={'security.', '/dev/kvm\x00'}, &(0x7f00000000c0)=""/40, 0x28) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 17:20:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x17, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:54 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1532.228126] Dev loop0: unable to read RDB block 6 [ 1532.233075] loop0: unable to read partition table [ 1532.238415] loop0: partition table beyond EOD, truncated [ 1532.243891] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2a00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x63, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:54 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000a07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x480000000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = dup(r2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000000)={0x6, [0xfffffffffffffff9, 0x2, 0x3, 0x41, 0xfffffffffffffff9, 0xfff]}, &(0x7f0000000040)=0x10) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000000c0)={0x3, 0x0, @ioapic={0x7000, 0x9, 0xffffffff, 0x8001, 0x0, [{0x81, 0x1000, 0x7, [], 0x100000001}, {0x200, 0x57e55b36, 0xfffffffffffffff9, [], 0xfffffffffffffffa}, {0x5635abb4, 0x5, 0x5c}, {0x5, 0x4, 0x1, [], 0x8}, {0xfe27, 0x9, 0xff, [], 0x8}, {0x2, 0x200, 0x1ff, [], 0x1f}, {0x5, 0x80000000, 0x9b7, [], 0x6}, {0x1, 0xffffffffffff8001, 0x400, [], 0x7}, {0xd0, 0x9, 0x8a, [], 0x75}, {0xd2, 0x4, 0x1c0000000000}, {0x1, 0x9, 0x3ff}, {0x800, 0x0, 0x5, [], 0x9}, {0x7, 0xf7, 0x0, [], 0x6}, {0x5, 0x20f, 0x100000000, [], 0x3}, {0x4, 0x8, 0x3fe0000, [], 0xfffffffffffff001}, {0x800, 0x7fff, 0x5, [], 0x100000000}, {0x8, 0x101, 0x0, [], 0xa8}, {0x2, 0xfffffffffffffcfb, 0x1f, [], 0x2d}, {0x6, 0x0, 0x2}, {0x4, 0x100000000, 0x4, [], 0x7}, {0x9, 0x6, 0x7, [], 0x3}, {0x2b1, 0x3, 0x7, [], 0x6}, {0x1, 0x1800, 0x4, [], 0x3ff}, {0x4, 0x8, 0x101}]}}) 17:20:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x27, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1d000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x1ffffffffffd, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x33a}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0xefd, 0x20}, 0xc) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KIOCSOUND(r3, 0x4b2f, 0x6) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) r5 = socket$inet6(0xa, 0x1, 0x921) setsockopt$sock_int(r5, 0x1, 0xa, &(0x7f0000000000)=0x8, 0x4) [ 1532.518581] Dev loop0: unable to read RDB block 6 [ 1532.523757] loop0: unable to read partition table [ 1532.542904] loop0: partition table beyond EOD, truncated [ 1532.564290] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:55 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1532.619622] device nr0 entered promiscuous mode [ 1532.655111] FAT-fs (loop2): bogus number of reserved sectors [ 1532.667016] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1532.678470] Dev loop0: unable to read RDB block 6 [ 1532.683503] loop0: unable to read partition table [ 1532.696604] loop0: partition table beyond EOD, truncated [ 1532.703277] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1532.762392] FAT-fs (loop2): bogus number of reserved sectors [ 1532.771786] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:55 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff95, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000200)={0x0, @reserved}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000180)={{0x200, 0x5, 0x0, 0x1fffffffb, 0x9, 0xd}, 0x3}) r3 = getpgid(0x0) capset(&(0x7f0000000000)={0x399f1736, r3}, &(0x7f0000000100)={0x94, 0x3, 0x5, 0x6, 0xda, 0x8}) write$P9_RAUTH(r2, &(0x7f00000001c0)={0x14, 0x67, 0x1, {0x80, 0x4, 0x1}}, 0x14) write$P9_RREADDIR(r2, 0x0, 0x0) 17:20:55 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01007a00ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:55 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1b000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffb5, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1533.137707] FAT-fs (loop2): bogus number of reserved sectors [ 1533.157660] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1533.179038] Dev loop0: unable to read RDB block 6 17:20:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) [ 1533.183935] loop0: unable to read partition table 17:20:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff87, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1533.219537] FAT-fs (loop2): bogus number of reserved sectors [ 1533.225489] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1533.232021] loop0: partition table beyond EOD, truncated [ 1533.259521] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000000)={0x7, 0x1, 0x1}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x44, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1533.354304] device nr0 entered promiscuous mode [ 1533.428874] Dev loop0: unable to read RDB block 6 [ 1533.435101] loop0: unable to read partition table [ 1533.448331] loop0: partition table beyond EOD, truncated [ 1533.466177] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:56 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:56 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x69, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r4 = getuid() fsetxattr$security_capability(r2, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0xbcf6, 0x800}, {0x0, 0x400}], r4}, 0x18, 0x1) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000380)=@v2={0x3, 0x2, 0x1, 0x3, 0x1000, "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"}, 0x100a, 0x1) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x240401, 0x0) getsockopt$inet6_tcp_buf(r5, 0x6, 0xd, &(0x7f00000001c0)=""/48, &(0x7f0000000200)=0x30) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:20:56 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000006c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12260000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xf, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1533.888191] Dev loop0: unable to read RDB block 6 [ 1533.893229] loop0: unable to read partition table [ 1533.917471] loop0: partition table beyond EOD, truncated [ 1533.927324] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40000, 0x0) getpeername$unix(r3, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:20:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x57, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:56 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6204, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1534.078100] Dev loop0: unable to read RDB block 6 [ 1534.083375] loop0: unable to read partition table [ 1534.095516] device nr0 entered promiscuous mode [ 1534.101539] loop0: partition table beyond EOD, truncated [ 1534.110076] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:56 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1534.298495] Dev loop0: unable to read RDB block 6 [ 1534.305892] loop0: unable to read partition table [ 1534.319088] loop0: partition table beyond EOD, truncated [ 1534.333892] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1534.598290] Dev loop0: unable to read RDB block 6 [ 1534.603349] loop0: unable to read partition table [ 1534.609012] loop0: partition table beyond EOD, truncated [ 1534.614693] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:57 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100"}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffd4, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) r2 = geteuid() fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @remote}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x1}, [{0x2, 0x2, r2}, {0x2, 0x1, r3}, {0x2, 0x4, r4}, {0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x34a5c3faf844de7a, r7}, {0x2, 0x2, r8}], {0x4, 0x6}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x5c, 0x2) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r9 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r9, 0xc00caee0, &(0x7f0000000340)={0x4}) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xc27be1f669297461, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r10, 0x4018aee2, 0x0) 17:20:57 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x29, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:57 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000b707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x67, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 17:20:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff9f, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x374, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1534.829084] Dev loop0: unable to read RDB block 6 [ 1534.836626] loop0: unable to read partition table [ 1534.858854] loop0: partition table beyond EOD, truncated [ 1534.883693] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x45, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:57 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1534.939317] device nr0 entered promiscuous mode [ 1535.019023] Dev loop0: unable to read RDB block 6 [ 1535.027886] loop0: unable to read partition table [ 1535.049560] loop0: partition table beyond EOD, truncated [ 1535.072287] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffc4, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) mq_getsetattr(r1, &(0x7f0000000080)={0x8000, 0x0, 0x63857abd, 0x6, 0x5, 0x803, 0xfffffffffffff105, 0x10001}, &(0x7f00000000c0)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) readahead(r2, 0x176, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:20:57 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000c107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:57 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:57 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100"}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xf00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x6a, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000080)={0x1000, 0x0, &(0x7f0000000000)="1282ff07bd8009d2b45c65de52fad5dd358b9e8099c132e378fba7", &(0x7f0000000380)="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", 0x1b, 0x1000}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1535.493419] Dev loop0: unable to read RDB block 6 [ 1535.516831] loop0: unable to read partition table 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x4f, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1300000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1535.547667] loop0: partition table beyond EOD, truncated [ 1535.554161] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffc3, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:58 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r3, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r4, 0x24, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x805}, 0x4000) [ 1535.699543] Dev loop0: unable to read RDB block 6 [ 1535.704640] loop0: unable to read partition table [ 1535.706205] device nr0 entered promiscuous mode [ 1535.716948] loop0: partition table beyond EOD, truncated 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffad, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1535.743007] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:58 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000f07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1535.988386] Dev loop0: unable to read RDB block 6 [ 1535.993617] loop0: unable to read partition table [ 1536.004889] loop0: partition table beyond EOD, truncated [ 1536.018356] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:58 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100"}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)="605b5cbb79039920b8e6bb07eb8a5c0ef12b7eeedacc2bb5bb5fc689d3c23d2df7e1047c7f496d0eb9954233b0da64d038a3b31cdfde3f3c3fe9b7200256ee24638602877aea01b1877d6b1784acb4bc8e022d6eea3826b84ec44b820839bd0627fef287137ccc2a676704f4207678745e3483d6d090908a587301d1c907d365f9ec83b67b04aaea9c03f4bfcdde96df110990bf7a3b92157f1e167a183e3a94729ce24f1c9e0d482da2024646b9abc36ec1da3751e3acec13e946e5ba80f09311d35c7b1c57abcc313736ad0e8efd00dfd51937d27cb73b5c", 0xd9, 0xfffffffffffffff8) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="d10f8caf0aac1f55f8c4809ef37b24", @ANYRES16=r3, @ANYBLOB="000025bd7000fcdbdf250d00000014000200080007000600000008000b00020000001400020008000800680000000800090000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="a26985e9dcbb28b62d3b845e12c040f53bafa62ff5a138f6d8792c222d95b460e1bc9a4d8599c5ecc2f6902dea9507f941b33eccf968d7b57c045a3ffd1196839391eea7399d6c393d54393ffcc2ef0384ba27813362f90c60b0514ba1acbc0d8460f62ad82c66d779dee93029d758f313a902aab5b30f3d0e8ecfcace1ea60e94d841fdcb39d03d5836cf549192053bb768fd8b947bc9b37b93b2e6bf2e0c364eb4e6997861c382f1edef7f78ba0454dafdf62ad3934e1d8d6ad89c1c14d5323e864f71416d4e00dfba3471249e0a5f", 0xd0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r5) 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x75, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:58 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1536.158248] Dev loop0: unable to read RDB block 6 [ 1536.163382] loop0: unable to read partition table [ 1536.175865] loop0: partition table beyond EOD, truncated [ 1536.189745] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x34, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:58 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='attr/sockcreate\x00') ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000300)=0x10000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) r4 = memfd_create(&(0x7f0000000100)="275b835e656d312b5d73797374656d2d2b2a70726f636367726f757000", 0x4) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80a00}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0xe0b, 0x70bd25, 0x25dfdbfb, {}, ["", ""]}, 0x1c}}, 0x4000) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20940, 0x0) ioctl$VIDIOC_QUERYMENU(r6, 0xc02c5625, &(0x7f0000000080)={0x8, 0x1f, @value=0x6}) ioctl$VIDIOC_G_OUTPUT(r6, 0x8004562e, &(0x7f0000000380)) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x3, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x60800, 0x0) 17:20:58 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000a207000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x65, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1900000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1536.394662] QAT: Invalid ioctl [ 1536.408970] QAT: Invalid ioctl 17:20:59 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x15000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1536.438997] QAT: Invalid ioctl [ 1536.444763] QAT: Invalid ioctl [ 1536.448310] Dev loop0: unable to read RDB block 6 [ 1536.464435] loop0: unable to read partition table 17:20:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x3d, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1536.494627] loop0: partition table beyond EOD, truncated [ 1536.502836] device nr0 entered promiscuous mode [ 1536.511396] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1536.638258] Dev loop0: unable to read RDB block 6 [ 1536.644501] loop0: unable to read partition table [ 1536.655390] loop0: partition table beyond EOD, truncated [ 1536.668078] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:59 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) pipe2(&(0x7f0000000000), 0x84000) 17:20:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x6c, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:59 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000ee07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:59 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:20:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xfffffff5, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:20:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x8e, 0x400800) write$P9_RREADLINK(r1, &(0x7f00000004c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0xfffffffffffffdd3) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000400)=[{&(0x7f0000000140)="f911bb90ec04b1c08d7462debd44673ab1ff6b3d1ebf6e8a12847b87493f00a35b3a39dc801bd11bbc63af763351c12c8da644e0e210932b4ccdd8d0453c0604d61f02bc1419654964007374d74ec5b5f11fa64c61266031e1ae899a4ce1ec09124ed5250d4f585b021121b37b3a8398143ff3499ff71ab58a53f05d2cde8909de0f6ab35b28521d9b7ed1678acb40a4a80c34801a18863ec7189a02d1c3013321e72eed7053", 0xa6, 0x100000000}, {&(0x7f0000000200)="e9fbd9879b9fce0afb3db3165ec5ff2bf8928a4f2fd423b79a40d9b402eefbfbc004dc0a950b513f74b86cc056814e11ec40a484ba4c244e4ce094aeaf25ef8c6ca85bc503e6533efd424700d6fc256d84d29805788893cfd4fad4e20d3a33c1eb27980436b5b4426eff34e80c46135645ed9f6057c2f82ccc45c63357544cf371795d73c51e66f025e6e3fde7b1d4abc65627bc41c69600fa67c8a141511110473514d30646d83d78a88c1616fdc0fb9c02d33d8c5b91dc2834645ea8e309811f566472e204fd8dcd31ac18bdb94900a10932e5d7e5e93e6b0d122c1eaa9b71765bc0bfb3df01d935b13115e2ed", 0xee, 0xfffffffffffffff8}, {&(0x7f0000000380)="c6f7ad4d7864ca685d6a38859b40c1b8c9291ab7e9de02b27608abd40abb778f5766d6d81d13ca8066d94743ce6d0322bd3b5e9a17d3f5ea1ea2362b7d23bd225c95a193b69399bab17b394e507ef920c303175223a3d91ff0d4ebda05c0ff9b45ada2f601feb7d453b4b18c48c164c161f970371916f2f611f1b83b3c", 0x7d, 0x1}], 0x0, &(0x7f0000000300)='selfcgroup,\\^user,\x00') write$P9_RLINK(r3, &(0x7f0000000080)={0x7, 0x47, 0x2}, 0x7) readahead(r0, 0x332, 0x2) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) [ 1536.998106] Dev loop0: unable to read RDB block 6 [ 1537.003052] loop0: unable to read partition table [ 1537.003122] loop0: partition table beyond EOD, truncated [ 1537.031271] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x13000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:20:59 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffa4, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1537.139174] Dev loop0: unable to read RDB block 6 [ 1537.145472] loop0: unable to read partition table [ 1537.161806] loop0: partition table beyond EOD, truncated [ 1537.172467] ceph: device name is missing path (no : separator in /dev/loop1) [ 1537.177496] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:20:59 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:20:59 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1537.229940] FAT-fs (loop2): bogus number of reserved sectors [ 1537.264765] FAT-fs (loop2): Can't find a valid FAT filesystem 17:20:59 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:20:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x14, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1537.286759] ceph: device name is missing path (no : separator in /dev/loop1) [ 1537.358134] Dev loop0: unable to read RDB block 6 [ 1537.363061] loop0: unable to read partition table [ 1537.387403] loop0: partition table beyond EOD, truncated 17:21:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x1, 0x10, 0x7, 0xffff}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e22, 0x6, @remote, 0xd354}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000380)={0x66, 0x8, 0x4, 0x7, 0x3, [{0x5, 0x3, 0x1ff, 0x0, 0x0, 0x2}, {0xe60, 0x7ff, 0x57, 0x0, 0x0, 0x2180}, {0x7, 0x8, 0x1fa7, 0x0, 0x0, 0x400}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) [ 1537.408709] FAT-fs (loop2): bogus number of reserved sectors [ 1537.414546] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1537.420623] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x21, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:00 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:00 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1537.547644] Dev loop0: unable to read RDB block 6 [ 1537.556383] loop0: unable to read partition table [ 1537.573191] loop0: partition table beyond EOD, truncated [ 1537.590836] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x1c, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:00 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000a007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = gettid() ptrace$getenv(0x4201, r2, 0x2e8, &(0x7f0000000000)) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000100)) 17:21:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x1d, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:00 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1537.800811] Dev loop0: unable to read RDB block 6 17:21:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffbf, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1537.828114] loop0: unable to read partition table [ 1537.839220] loop0: partition table beyond EOD, truncated [ 1537.864952] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1537.882013] FAT-fs (loop2): bogus number of reserved sectors [ 1537.890332] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:00 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:00 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1537.936876] FAT-fs (loop2): bogus number of reserved sectors [ 1537.947441] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x87, 0x20000) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:21:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffffc5, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1537.978426] Dev loop0: unable to read RDB block 6 [ 1537.983964] loop0: unable to read partition table [ 1538.007745] loop0: partition table beyond EOD, truncated [ 1538.017341] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10000000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:21:00 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff97, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:00 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x21, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = socket$inet(0x2, 0x80000, 0x100) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000000)=0x100, 0x4) 17:21:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2226000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:00 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x7, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1538.259116] Dev loop0: unable to read RDB block 6 [ 1538.265402] loop0: unable to read partition table [ 1538.290600] loop0: partition table beyond EOD, truncated 17:21:00 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1538.311693] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1538.428458] Dev loop0: unable to read RDB block 6 [ 1538.439392] loop0: unable to read partition table 17:21:01 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x116}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0x2, 0x7, 0x80000000, 0x4f, 0x17, 0x4, 0x7, {r2, @in6={{0xa, 0x4e20, 0x3f, @empty, 0x1}}, 0x7, 0x7, 0x1, 0x3, 0x5}}, &(0x7f0000000280)=0xb0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$VT_RELDISP(r0, 0x5605) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000000)={0x4, r4}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000002c0)=0x3ff, 0x4) 17:21:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1538.471585] loop0: partition table beyond EOD, truncated [ 1538.496413] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x3, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:01 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000c707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:01 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)=0xf) ioctl$TCSETAF(r5, 0x5408, &(0x7f00000006c0)={0x59, 0x7fff, 0x9f2a, 0x9, 0x4, 0x2, 0x3ff, 0x3, 0xfffffffffffffff8, 0x2}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x6d, 0x20000000000014, 0x0, 0x0}, 0x1db) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB="000800000000000c0000051adc7f670a168a1374"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000003c0)={0x84, @local, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20000000000, 0x0, 0x800}, 0x2c) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x16, 0x8, "9b93d7a7e4fb39daab332f2646ffb445fad3e6c64c7d19642a6510b05534a93dd1a7783832ccacc5a22e5745656880afdcaa3e913561c539a8dd796454a735b0", "46e63151428224c434353aedc66eb25afeb82377b1c529267d29919b97a34529", [0x9, 0x3f]}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) mount$overlay(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x2026002, &(0x7f0000000540)={[{@xino_off='xino=off'}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, 'net/tcp6\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f0000000680)={0x2006, 0x4000}) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000700)={0x80000001, 0x9, 0xde5b, 0xa588, 0x401, 0x3, 0x6, 0x10000, 0x8, 0x5e6}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000640)) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}, &(0x7f0000000380)=0x10) poll(&(0x7f0000000440)=[{r7}, {r9, 0x4208}, {r2, 0x401}, {r5, 0x2}, {r8, 0x109}], 0x5, 0x3ff) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0763044002400f00"], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x80000000c1018, r4, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="48000000000000004ae34a266afdc24528000000000000003800000000000000"]], 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7, 0x101000) 17:21:01 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1538.571984] FAT-fs (loop2): bogus number of reserved sectors [ 1538.584499] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xa00000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1538.668867] FAT-fs (loop2): bogus number of reserved sectors [ 1538.685272] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1538.698613] Dev loop0: unable to read RDB block 6 [ 1538.703516] loop0: unable to read partition table 17:21:01 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1538.732125] loop0: partition table beyond EOD, truncated [ 1538.746782] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2700000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1538.784112] binder: 30818:30825 DecRefs 0 refcount change on invalid ref 999426 ret -22 [ 1538.817032] binder: 30818:30825 unknown command 536872448 17:21:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x40000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1538.833108] binder: 30818:30825 ioctl c0306201 20000400 returned -22 [ 1538.888463] Dev loop0: unable to read RDB block 6 [ 1538.897694] loop0: unable to read partition table [ 1538.917380] binder: BINDER_SET_CONTEXT_MGR already set [ 1538.924029] loop0: partition table beyond EOD, truncated 17:21:01 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xc000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1538.946189] binder: 30818:30833 ioctl 40046207 0 returned -16 [ 1538.952984] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:01 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1a000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1539.003996] binder: 30818:30833 DecRefs 0 refcount change on invalid ref 999426 ret -22 [ 1539.004361] binder: 30818:30834 unknown command 536872448 17:21:01 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01020000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xff00, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1539.088269] binder: 30818:30834 ioctl c0306201 20000400 returned -22 [ 1539.111553] FAT-fs (loop2): bogus number of reserved sectors [ 1539.125588] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100000001, 0x2000) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xe13e08fe6f85b7ed, 0x480000000, 0x6, 0x8}) 17:21:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x2, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1539.198787] Dev loop0: unable to read RDB block 6 [ 1539.213067] loop0: unable to read partition table [ 1539.222929] FAT-fs (loop2): bogus number of reserved sectors [ 1539.229074] loop0: partition table beyond EOD, truncated [ 1539.236672] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4a, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:01 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1539.237440] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:01 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x1, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:21:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1d, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x700000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1539.358685] Dev loop0: unable to read RDB block 6 [ 1539.363732] loop0: unable to read partition table [ 1539.381432] loop0: partition table beyond EOD, truncated [ 1539.400549] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:02 executing program 1: shmget(0x0, 0x1000, 0x8, &(0x7f0000ff3000/0x1000)=nil) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x100, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f00000003c0)) shmget(0x1, 0x3000, 0x54000004, &(0x7f0000ffc000/0x3000)=nil) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2080, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x5, 0x80000000, 0xff}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000002c0)={r3, 0x1, 0x5238}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000100)=r3, 0x4) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000001c0)="66baa000b866400000efb805000000b900a000000f01d966baf80cb87ee75b81ef66bafc0c66b8000066ef66c0cdef660f38827e0066baf80cb844a66581ef66bafc0cb800600000ef660f01991c000000b8010000000f01c1d13b66b85b000f00d8", 0x62}], 0x1, 0x10, &(0x7f0000000280)=[@efer={0x2, 0x801}], 0x1) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={r3, 0x5, 0x3, 0xac}, &(0x7f0000000180)=0x10) 17:21:02 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008d07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x1000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1539.451136] FAT-fs (loop2): bogus number of reserved sectors [ 1539.469857] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:02 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:02 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$getown(r0, 0x9) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r4, 0x720, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'ib', 0x3a, 'bridge_slave_0\x00'}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x4000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r5, r6) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 1539.562441] FAT-fs (loop2): bogus number of reserved sectors [ 1539.582741] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x3f00000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1539.638474] Dev loop0: unable to read RDB block 6 [ 1539.646190] loop0: unable to read partition table [ 1539.652973] loop0: partition table beyond EOD, truncated 17:21:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6004000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x300000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1539.704268] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:02 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000100), &(0x7f0000000140)=0x10) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x101000) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) 17:21:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x3000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1539.840984] Dev loop0: unable to read RDB block 6 [ 1539.851201] loop0: unable to read partition table [ 1539.871516] loop0: partition table beyond EOD, truncated 17:21:02 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x16000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1539.896388] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:02 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000006d07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x700, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101200, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x5, 0x6, 0x1, 0x1000, 0x9}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000100)={r4}, &(0x7f0000000140)=0x8) 17:21:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xa00, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1540.030073] FAT-fs (loop2): bogus number of reserved sectors [ 1540.047172] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:02 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1540.117741] FAT-fs (loop2): bogus number of reserved sectors [ 1540.123575] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xc, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1540.169517] Dev loop0: unable to read RDB block 6 17:21:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xb00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:02 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000080)) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x80000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) [ 1540.190935] loop0: unable to read partition table [ 1540.218219] loop0: partition table beyond EOD, truncated [ 1540.243457] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1540.259776] FAT-fs (loop2): bogus number of reserved sectors 17:21:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xc00000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1540.265929] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1540.282538] audit: type=1400 audit(1544808062.851:475): avc: denied { map } for pid=30956 comm="syz-executor1" path="/dev/kvm" dev="devtmpfs" ino=14865 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:kvm_device_t:s0 tclass=chr_file permissive=1 [ 1540.339208] FAT-fs (loop2): bogus number of reserved sectors [ 1540.345058] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1540.358575] Dev loop0: unable to read RDB block 6 [ 1540.366110] loop0: unable to read partition table 17:21:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x10000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1540.385637] loop0: partition table beyond EOD, truncated [ 1540.407710] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:03 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000c207000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:03 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) getpeername$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) 17:21:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1a00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:03 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x3f000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:03 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:21:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x2000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1540.618260] Dev loop0: unable to read RDB block 6 [ 1540.623530] loop0: unable to read partition table [ 1540.628828] loop0: partition table beyond EOD, truncated [ 1540.634536] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xf000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:03 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1540.728575] Dev loop0: unable to read RDB block 6 [ 1540.733578] loop0: unable to read partition table [ 1540.752218] FAT-fs (loop2): bogus number of reserved sectors [ 1540.758686] loop0: partition table beyond EOD, truncated [ 1540.767413] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x300, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1540.774892] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:03 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:03 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01740000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x13bff8282258e352, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 17:21:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x3c, 0x0) uselib(&(0x7f0000000000)='./file0\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040)) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000600)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:21:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4a00, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1540.848596] FAT-fs (loop2): bogus number of reserved sectors [ 1540.875227] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:03 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1541.000102] Dev loop0: unable to read RDB block 6 [ 1541.019955] loop0: unable to read partition table 17:21:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xa, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1541.046554] loop0: partition table beyond EOD, truncated [ 1541.078975] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1541.095150] FAT-fs (loop2): bogus number of reserved sectors [ 1541.107064] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:03 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x200000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1541.190401] FAT-fs (loop2): bogus number of reserved sectors [ 1541.197968] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1541.215036] Dev loop0: unable to read RDB block 6 [ 1541.224847] loop0: unable to read partition table 17:21:03 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1541.237891] loop0: partition table beyond EOD, truncated [ 1541.247516] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xa000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:03 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000cd07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x100000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1541.449038] Dev loop0: unable to read RDB block 6 [ 1541.454470] loop0: unable to read partition table [ 1541.473011] loop0: partition table beyond EOD, truncated [ 1541.494108] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1541.579035] Dev loop0: unable to read RDB block 6 [ 1541.584115] loop0: unable to read partition table [ 1541.589961] loop0: partition table beyond EOD, truncated [ 1541.595670] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getrule={0x14, 0x22, 0x400, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008004) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:21:04 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:04 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x10, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:04 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000006b07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1541.916483] FAT-fs (loop2): bogus number of reserved sectors [ 1541.931963] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1541.939636] Dev loop0: unable to read RDB block 6 [ 1541.947726] loop0: unable to read partition table 17:21:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4a00000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1541.963839] loop0: partition table beyond EOD, truncated [ 1541.980507] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1542.006179] FAT-fs (loop2): bogus number of reserved sectors 17:21:04 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1542.028276] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000100)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={r2, 0x7fffffff, 0x2231, 0x9f9, 0x4, 0x8, 0x80000001, 0xfffffffffffffffe, {r3, @in6={{0xa, 0x4e24, 0x3000000000, @dev={0xfe, 0x80, [], 0x11}, 0x7}}, 0x6, 0x800, 0x800, 0x3f, 0x9}}, &(0x7f0000000240)=0xb0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee2, 0x0) 17:21:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1542.121676] Dev loop0: unable to read RDB block 6 [ 1542.139364] loop0: unable to read partition table 17:21:04 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xffffffff00000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1542.162339] loop0: partition table beyond EOD, truncated [ 1542.181964] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x1000000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:04 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009a07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:04 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000000)={0x380f, 0xff}) 17:21:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2400000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4000000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1542.399534] Dev loop0: unable to read RDB block 6 [ 1542.410976] loop0: unable to read partition table [ 1542.416030] loop0: partition table beyond EOD, truncated 17:21:05 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1542.448127] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xff000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:05 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000020000000000000000000000611270000000000095000000000000002a08f66d6692e241a20d3518a36745709f10168199ec4c24230111a03b16131aaf947db5d0440c376e96e9dc73cff09c79c561a00c0ba775902bc70cb316a06419b20d3443efeed27308b7fd0c8ce5fc08df50f821ab9acef6603c104417a33e57696cede796950d8741e5f5d1b5bf523f2a444480394e2a5419354f5fe6e9387c2004fef935d36c2dcc1fdd99fa24f183b0a404849f6b8f357d1094d3289a9b917870f45117128c840a1a0bf1cd4d2f1d0af8c554952f653b4df9a308096e339ea9ef21afb7e432f350366c2600dab05500bce16fda0cbfe413071b7e631b92eab6f0cb27ecc432b060b7f2e1900dc5694b05e73ee381f633b7f8cfa4448246a5311e9c94470e1fb1bfb7c6d3c33f2fae90c001af66e71eb5bd9bff47b12cd535c28f5620adceecbc4ddca003ace7aa83bcb03162b227e7fbcdc06d719c6574cccfe2be487f8eb0a3b91ba8852e0b93f980d7ee959cbdf733999df38b1e2ab5610dc452000fb3a521f806e0145c62172a8b41af40271dc37b72ce74d3107bc3e8e6da6093b9e00d9ad702ad589bc73681d27fa97ad4f1c713b2cf607fe63c75da746d7fb7d15fe8b97562b98d92b67503b95a2be7ecbca7e2bbfe6f8defeba6180672da"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x8000, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x800, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000100)={0x0, 0xfffffffffffffffc, 0xfff, &(0x7f00000000c0)=0x7ff}) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000280)={0x7, 0x4, 0xfffffffffffffffd, 0x3, 0x7, 0x10000}) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000140)) rt_sigpending(&(0x7f0000000000), 0x8) getsockopt$inet_buf(r3, 0x0, 0x2a, &(0x7f0000000740)=""/237, &(0x7f0000000840)=0xed) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000200)={0x1000, 0x6}) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f0000000240)={0x1, 0x0, [{0x0, 0x1, 0x0, 0x0, @sint={0x7, 0x400}}]}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000006c0)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000700)={r6, 0x2000000003}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000880)={0x0, 0x89, "727e585c62eb5f35cba36438a6806968f99b4bb88be0b61c43f8e8a2a6f9da7dab3cd5f6bcebdd9df8ee692f92b1dcab173939472e9ee4b8744011869f6c7a4d497421ac481a718b3e88340f262f6de9ef162fcca7a78080b56b802689337450c4e2577ea3f15e129450ad9a10327e0ee5172d1b9f6ebe1c26d038f652d4d5e127d15861d920d58866"}, &(0x7f0000000940)=0x91) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000980)={r7, 0xfffffffffffffffb}, &(0x7f00000009c0)=0x8) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee2, 0x0) fchmod(r0, 0x92) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000600)={0x0, 0x8c, "c3c946206118253e2214926d2413b89ecf986fafb10e3bb2a76b3252d18a6fa59d8294c8f77c8e22c4b83697e824d19012f6aed15b822ed92af8bf62bc47461932c1f572c05d9b993005bc829d7c4ffb0446c5e922e7d13d5eb5fa48656d0627216aab292cd1f7fca32c3aafb1e4e2acecc463a04463630dc0a6dbf1d1dbbbbb0b84b20196cc8d755a7b618c"}, &(0x7f00000002c0)=0x94) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000300)={r8, 0x7, 0x1, [0x7f]}, &(0x7f0000000380)=0xa) 17:21:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1542.560087] device nr0 entered promiscuous mode [ 1542.578382] Dev loop0: unable to read RDB block 6 [ 1542.599548] loop0: unable to read partition table 17:21:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1542.613801] loop0: partition table beyond EOD, truncated [ 1542.627028] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:05 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(r0, r0) epoll_create(0x1) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000000)='}em0(+\'/vmnet1[proc\x00') epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000100)={0xc0000005}) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 17:21:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xc00, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1542.838649] Dev loop0: unable to read RDB block 6 [ 1542.843813] loop0: unable to read partition table [ 1542.859488] loop0: partition table beyond EOD, truncated [ 1542.875523] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:05 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x100000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:05 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x1000001000, 0x105082) r1 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000180)='S', 0x1}], 0x1, 0x4081005) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r0, 0x11, 0x0, 0x100000001) [ 1543.138503] Dev loop0: unable to read RDB block 6 [ 1543.143413] loop0: unable to read partition table [ 1543.150115] loop0: partition table beyond EOD, truncated [ 1543.155629] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:05 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000b407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0xff00000000000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x31040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1543.419664] Dev loop0: unable to read RDB block 6 [ 1543.424858] loop0: unable to read partition table 17:21:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x10000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1543.460040] loop0: partition table beyond EOD, truncated [ 1543.491631] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:06 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1543.638866] Dev loop0: unable to read RDB block 6 [ 1543.644066] loop0: unable to read partition table 17:21:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x4a000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1543.687341] loop0: partition table beyond EOD, truncated [ 1543.694113] device nr0 entered promiscuous mode [ 1543.704036] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x45d, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:06 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01004c00ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1543.913228] FAT-fs (loop2): bogus number of reserved sectors [ 1543.926088] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1543.978917] Dev loop0: unable to read RDB block 6 [ 1543.990835] loop0: unable to read partition table [ 1544.027358] loop0: partition table beyond EOD, truncated [ 1544.037854] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1544.310016] Dev loop0: unable to read RDB block 6 [ 1544.319669] loop0: unable to read partition table [ 1544.331853] loop0: partition table beyond EOD, truncated [ 1544.343473] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1544.352093] FAT-fs (loop2): bogus number of reserved sectors 17:21:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x7000000, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:06 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:06 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:06 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340), 0x4) readahead(0xffffffffffffffff, 0x0, 0x6) getgid() sched_setaffinity(0x0, 0x8, &(0x7f0000000840)=0xd) r1 = openat$vhci(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x80}, {0xffffffffffffffff, 0x9000}, {r2, 0x40}, {0xffffffffffffffff, 0x8100}, {0xffffffffffffffff, 0x80}], 0x5, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f0000000200)={0x80000000}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) close(r1) mount(&(0x7f0000000500)=ANY=[], &(0x7f000000aff8)='./file0\x00', 0x0, 0x0, &(0x7f000001c000)) munmap(&(0x7f000054c000/0x7000)=nil, 0x7000) r4 = fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(r4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000013c0)=ANY=[@ANYRESHEX=0x0], 0x12) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) [ 1544.357995] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:07 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x3f00, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2100000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x2, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1544.609593] Dev loop0: unable to read RDB block 6 [ 1544.614802] loop0: unable to read partition table [ 1544.621995] device nr0 entered promiscuous mode [ 1544.634884] loop0: partition table beyond EOD, truncated [ 1544.657935] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:07 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1544.789037] Dev loop0: unable to read RDB block 6 [ 1544.794118] loop0: unable to read partition table [ 1544.821770] loop0: partition table beyond EOD, truncated 17:21:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {}, {0x2, 0x0, @multicast1}, {}, 0x2a0}) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xa000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1544.851796] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:07 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01680000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xa00, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:07 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1545.099914] Dev loop0: unable to read RDB block 6 [ 1545.105010] loop0: unable to read partition table [ 1545.110364] loop0: partition table beyond EOD, truncated [ 1545.115981] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x2000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1200000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:07 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 17:21:07 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:07 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x3, 0x3) r1 = socket$unix(0x1, 0x0, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2004002}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000080}, 0x40000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) listen(r2, 0x0) accept4(r2, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, &(0x7f0000000140)) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x1000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1545.259015] Dev loop0: unable to read RDB block 6 [ 1545.267840] loop0: unable to read partition table [ 1545.280419] loop0: partition table beyond EOD, truncated [ 1545.287508] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:07 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000003607000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x29000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4a000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1545.401008] device nr0 entered promiscuous mode 17:21:08 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1545.436009] FAT-fs (loop2): bogus number of reserved sectors [ 1545.469980] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1545.478541] Dev loop0: unable to read RDB block 6 [ 1545.506294] loop0: unable to read partition table [ 1545.518020] loop0: partition table beyond EOD, truncated [ 1545.529411] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1545.545492] FAT-fs (loop2): bogus number of reserved sectors [ 1545.558326] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1545.648183] Dev loop0: unable to read RDB block 6 [ 1545.654282] loop0: unable to read partition table [ 1545.666430] loop0: partition table beyond EOD, truncated [ 1545.679880] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:08 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007b07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4a00, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:08 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:08 executing program 1: r0 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r0, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="bf16000000000000b707000001000000487000000000000040000000000000009500000200000000"], 0x0}, 0x48) 17:21:08 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x3104, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x40000) 17:21:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1546.019063] Dev loop0: unable to read RDB block 6 [ 1546.034668] loop0: unable to read partition table [ 1546.057492] loop0: partition table beyond EOD, truncated [ 1546.063381] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1546.101265] device nr0 entered promiscuous mode 17:21:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x458, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x300000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1546.178920] Dev loop0: unable to read RDB block 6 [ 1546.184796] loop0: unable to read partition table [ 1546.200565] loop0: partition table beyond EOD, truncated 17:21:08 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1546.222885] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:08 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000001c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1546.345238] FAT-fs (loop2): bogus number of reserved sectors [ 1546.360474] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x100000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1546.493936] Dev loop0: unable to read RDB block 6 [ 1546.501536] loop0: unable to read partition table [ 1546.515837] loop0: partition table beyond EOD, truncated [ 1546.528332] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:09 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1546.695509] FAT-fs (loop2): bogus number of reserved sectors [ 1546.702910] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1546.702966] Dev loop0: unable to read RDB block 6 [ 1546.714812] loop0: unable to read partition table [ 1546.730867] loop0: partition table beyond EOD, truncated 17:21:09 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x700, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1546.754263] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:09 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0xe5c612777fa3c1cc, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x1d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_INFO(0x0, 0x1, 0x3, &(0x7f00000010c0)=""/4096) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) request_key(&(0x7f0000000680)='keyring\x00', 0x0, &(0x7f0000000700)='/dev/vsock\x00', 0xfffffffffffffffb) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000001c0)={'yam0\x00', 0x5}) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3000004}, 0xc, &(0x7f0000000340)={0x0, 0x1d3}, 0x1, 0x0, 0x0, 0xd4}, 0x20040000) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syncfs(r2) preadv(r0, &(0x7f0000000540)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/21, 0x15}, {&(0x7f0000000280)=""/161, 0xa1}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f00000004c0)=""/103, 0x67}], 0x5, 0x0) msgrcv(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="000000000000ffffffffb71b56d4d8badf2100800000000700000000000000000000367a4a12a61800000000000002dadf9ea95fc8dcf95254b5caacfb70c9377f96b26cabe8d494693222fedeaabfd062a3adebdbe6b0e0fa0a06b734c2ef9cab03dce80631965a90560b08b58c5b6b7c4422b96a79c3f9cf0700000000fb0000000000"], 0x1, 0x3, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000200)={0xc, 0x3e, "5a0ba0acb05e3f32fc6504f86b34e2f28de584a1050c050237e4362b8adfd29cb5780a76d5c3653fc8fc2590ffd218b34578a8ea1d169682ad5b42e61711"}, 0x44) bind$bt_sco(r1, &(0x7f00000006c0)={0x1f, {0x40, 0x1000, 0x1, 0x21a0, 0x1, 0x1}}, 0x8) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000600)={0x0, {0x2, 0x6c, @dev={0xac, 0x14, 0x14, 0x14}}, {0x2, 0x4e23, @rand_addr=0xffffffff}, {0x2, 0x4e21, @remote}, 0x80, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)='bcsf0\x00', 0x3f, 0x5, 0x8001}) 17:21:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:09 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000b507000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:09 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff00, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1546.952281] FAT-fs (loop2): bogus number of reserved sectors [ 1546.967573] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1546.973920] Dev loop0: unable to read RDB block 6 [ 1546.979277] loop0: unable to read partition table [ 1546.999008] loop0: partition table beyond EOD, truncated [ 1547.011024] device nr0 entered promiscuous mode [ 1547.016021] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1547.045566] FAT-fs (loop2): bogus number of reserved sectors [ 1547.057550] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x10, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1547.128742] Dev loop0: unable to read RDB block 6 [ 1547.137546] loop0: unable to read partition table [ 1547.159122] loop0: partition table beyond EOD, truncated [ 1547.179929] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:09 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x100000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:09 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000f207000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1547.388236] Dev loop0: unable to read RDB block 6 [ 1547.397341] loop0: unable to read partition table [ 1547.403785] loop0: partition table beyond EOD, truncated [ 1547.418677] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1547.538604] Dev loop0: unable to read RDB block 6 [ 1547.543795] loop0: unable to read partition table [ 1547.559837] loop0: partition table beyond EOD, truncated [ 1547.575604] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:10 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4000000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1547.835112] device nr0 entered promiscuous mode 17:21:10 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket(0x400000000010, 0x3, 0x0) write(r1, &(0x7f0000000480)="2400000021002551075c0165fff5da8f57000000fd100f0007e1000c08000e0000000000bc0000008f3943793a5ea67658cb22d90000000000000059b97dc8f8b550e66a2bff77c4931daa4157f7a7831ddef1b31e45c1000000000070d851f785ea2b85d32b3583d87124da3bb0b9edcc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd5258010300e983cf4544a9c4c396f36e85787a8efc32e0015c85eae53543f9f65e3da31a110af1acb78ce510c7a70723741b34981d1b182deb79040000000000000000b6e3e4", 0xe0) 17:21:10 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xe00000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:10 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000cb07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xff00000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x1000000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1547.988478] Dev loop0: unable to read RDB block 6 [ 1547.996473] loop0: unable to read partition table [ 1548.010944] loop0: partition table beyond EOD, truncated [ 1548.025125] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xc00000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4a, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:10 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x7, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:10 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000b0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 17:21:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xc, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x22000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1548.330647] Dev loop0: unable to read RDB block 6 [ 1548.335571] loop0: unable to read partition table [ 1548.357559] loop0: partition table beyond EOD, truncated [ 1548.363445] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:11 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000008707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xffffffff00000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1548.465210] FAT-fs (loop2): bogus number of reserved sectors [ 1548.477791] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:11 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="3001af48c6829499"], 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0x0, 0x1}, 0xc) [ 1548.566560] FAT-fs (loop2): bogus number of reserved sectors [ 1548.596154] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1548.603677] Dev loop0: unable to read RDB block 6 17:21:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x4a00000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1548.612222] loop0: unable to read partition table [ 1548.644875] loop0: partition table beyond EOD, truncated [ 1548.655759] device nr0 entered promiscuous mode [ 1548.661190] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:11 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001280)='/selinux/enforce\x00', 0x1, 0x0) write$UHID_INPUT(r0, &(0x7f0000001500)={0x8, "dcb404fcc509adca635a426e77974bfa535a4cbaa372b97e79ab63920fde399bc41fd420c7ece7d2988a0d8aea82c81229d2d1c9ca7e57b7690a639d4728c04f347a4b7a97fe7d908aadb33192fbba62163a35a3a2461cf157dc902893d971a637bad550c178b372e9da91cc6cb7ac0819c19806b82bec977f27d9cff3d50d558f0e4e268eed2475ff4941f96f6dcec5228d95b36e3b192d809b52119bb4dcc85cb048422ad603b4d0c7b1af179cf702dcb90ab6accf7b65e2faf7549871b1f0d169ac9490271fbb742ef06f4311eb695e0a3b9a548900a07ac44deb120c1f22ad26109dd1d7b13da2ab6150420f4a1af81736943902aba52137c0419330a57b8daf467b8b14d430253ab9a56f078400736b1bd5d98d5c4de4330aa800ea3999a9b662d40a146ccdc658208a3d0de840ac651f172ec4152080aff9bc339d3ffc5bdbd9e4aae70a4d80fb0aaba3a8945382f22471048c7f0d0d7d065d0df2dce4c2c4e2ba084844f564d04445705a51170510043e0de4bdfa30e0aac9dd29f7070a454c9757a55376d55f5aa81c8e1aa7a2ec982962f1d807d2d16a9c5fc23d239043c83da15b15c69146e8260bc5c156c7fcd6cfbd529655e5b7460062f24d8f0df42e99f66a99e1a51af6c6a9a191086d775ce95f889a1693f41ccdaba6541794422b6944f51e1f25ae89abd77ca6650aeed20065ce081ee42de9c13d833a8a822d7fa6e64a373ae78a7b62dfebd105c1ac17f49b022c28c2bbda797086f97b8603233b86417342adec4d9891732276413ca6beb6cbf61a73322f7335530f31391bbc221e49662b6215de88111f08b2a46e69e5cf51c9ec2178a7b206c9e4700886eeea7bb156e2674feb7df558ed2f3f0e7e852cc1c7bda1c7625324aaf61636da31cc2bf5b756853e6b944ca63b20d9db0e1715ae5cbc8139fca2d0ddde4e22ee673027df8163b58603fd971a24545dc5e76a84bd4c6ca3216e7bff7d6bf9119d4d974871c580307683b2b70efb6650a6fbe7c4e30218087eeaea9cb6f72116bc9dead783fe9a5fd4ee8b3a7a6c77a529f69aa45e229fba78bf2460b34402165230fcd76883d9e696dd005e358517438de42c7661b01a34dfde14d391dba36f6d41a81bbbbda056b22b1d8b5bf05886c19e78c586e1ed06fbd860a5b195cf9c52da7896670998c5d5827182806d07486faff525caef8763235772b8b79b9561ebe9f4faa482ef27db1d17b98aca57dc235cc878d7ff3b1671f7eb672ef296e6a1e3899a988e8e16c151a0610ceaa27b56f15f90411538057ffa9e328ba297fcb3c0b8fe20fcddb88be59f4a64306041475f6bbca6ec8fe1bbe310ef74fee718407fefb2c8b3b03ce767dfd65094700916dc5b7c066cf560da4061dbaf1605ac9d3d528c1759d77863260778b65e990eafe5ffdbb08bd06cc9714e4e789dfcba6e6797f5ba24b4e5a29ecae9210a0cffec22ee4e6dbe69902c963ff3abc4930b7226da960f4355352ba687b5659a491acb57a031b6d151957280d7c4e073859bb22ae26de3a5069b90a6afdc4b169fbd6e523f479e86edc6af97c0f4bd0bf035c81695405d04d712df85375e8abc5c4179df85f726cc45ab01558e9eb306505b005fe309eb1aac27640a895e89a533d38c60995590b202c0453487f4703e23bd377910a9f76c784ee4070cbe3a3d460566998f0ac80d1e55603eeb692ed538e73032da1d128954dfcd39d969dca33df696c6acb07a8654789f3a8b89cc66cb4a3ae20750345cf133cb6f8c0717d0f0e1bab45301e8d4db107405f7e45605808875e00ddf5d14415670c7096873ccfbc2a2d8eb554226c7d5531e9e48541b1ca94d846b5f13eeeedf14df4e4eee1215390759eabd99284cd41f16423ead87b006b8b52f242f51312683febb51305719af914ccf4090825f7f5bb50662204e2df2ed6b2aa8cb786c83a3b0f5f67ad44e7d19f58cf7f07838b6f0f359c93a2d2bca8321fb40b4c723f8d61fe0ea8f0c8d12f9782469ead820a7ffc4b03bf4594186ae04f7015e2978d743b7b708627887936d2d9fda997fd09ca557c0c359cf9f31ee5a93348cb835fa7377f8763486b25c44f8aab21c4e9fc5d6b9a0085b7389dfd92060453f089c15ca3f9c98736fe2223c9a7348666c62702e6aa118aaaecca4a173b374fdc58c67f514505c15b746c7e7e09db3cbecf6fd3a80b67d665ae43b42918bb409f263af3c32f4efdcc5243285a80171cb094ec92075bbfd65f4beb27659e5021770a0b0fa278ef99c479560ebb791dfb000bdfb97d14d33ee2d12871629418a654468021d269e286d2d4e1a14dcb998673408991ae3a3a1ba0de0c1a3f48c9b3b46ad645c78a8bf638347f7212352b112065c9678aee3c05d14a73f3cdce6080ff174b14daea0fc529316b0d9ed4c95874bef286e04ac741352ad50a9026efdde7091af21ddb54a80b61118117452b900d263374f0216ab7c84e1b2bc270195cdc87503d060182aad8f4716407375f0f841c9e24a51330dd7962d199c4c436ab5deba47783a28db56f0b3323d317e7c811c1beda5e07e7f324d9f77f9c2fdb03c1fcbc33614ea9320a4507b02ef41053a5d6b02e9c8bbc156a8105f158df935cebd3c1a39ac7dd2cd55d57967ca5aced7f38015b6f20be5fe1ccf0a40f997eef3f1572dc2a03ac000eaf0b45f027e83b02c1abb21bb6ef3438ad79b9f7f3bcd8656141d78683192b4d047e71a8eb225c3871acd7a9fb65646148a00ad50478202432ce09534ff131776c4388b0c1c778b6f70d0665411c14a7f85041b0396170df4cf92d863fa264962cfc74535fa5f75172782a37ba6ef78ac8095390cb4078024ca3a5630eca5b70a96db2be091ec6eed6f75c7809b0c84ef15f51b3774d41a71180c99015a95855e2a9a473b27dce9867a609e39fd82abf522a28dd1650b34b7168f649d56b205e4aae46fa4751afedce5a27cd71c4607aa832a9b6234800dd772354286612f3038ca4cf988d65fa2312e6b85dac4278099fa77ed1a3e5894645a7629064e219d45e4b7ebddac63dbe9ee92ae791da11ae5253245eab6877614db57ee16aa4bb968bd5d44a1f107d7d51f3493336697877383be410091c995643715f40898529ddb7476b83e30f782c03ec3b2e267ee402afedb61cd9681bbf3718ef6057c7fee989a9ae1d59bfd4b168ee9767c05b534292373bbd1d135a5237b83fa4b3b0a73c0a3a2b88cbdc70dddba42e83af14aba5e49d3b712e9a0dde39fbd24677ced9f9b9feee367cdfc200999861146756ee832aed39db638054d7a369c3d54847e38bd0d3416df8b66dd98ee66917b49d337e797660b703942e273dfb5039401c9d54fc1c49d11532dc2d6b9bd87769338c55d5267993df28b3e5c78a6a5aeb61b1833cb38a86b96c075af51ff56a886816f3cbcde79e98de983a6ad24a6990c3e456b60282286f0f1e5e217c51fa9d701f3c9c7d2eb3dd7c0c413ef58e0100633ed5decea889cce68bd1679ee0700ee966f6ce6b56f4f2d24e9daee0064eca268d831de5ddde05147aed6af934964f9bf09c63439191ca321535f340652a80eb9857b113e016df695bdc0f0f522b1a1821efdc050f2000ec00a39be4f76e74e09c17e97d5e0d38a740f4eb305113629c76d259fbbf1797edaf1ef9c71ea0b6cbfd0b7faf4099715ae1c74fdd918e443fc2ab8524640cbe60c8aa7d245967d2000ddcdc2c3479d5ca73052e9a7369ea185b9eb45dcfb11e56d9edae353bee10c1896f0f799a2c11adc12b8bd17e0a33062103bd659090d77cb778b3fb59dad5b8c6519212b82ef038bc568492afbc3df14e9c995fc8b5707fec85817594c81d80739be16c15ac19c79f1f37e7433a53886cde7d4da04c6f463cc178ca3f456218cdc5323d1931cb2080dd76c9c79818ebc4dfe6423489468c85c8a2d9da9f4b0b227c72478da0b247af67393c73ab83f962c0839523f93378cf9f5d5e5feba043f5d9374788f23f8918049fd7031ded58f33bf59f8a37655466881dca90a8db5186007bf80918d77c9f17fd912edf0c1a0e8f42ab5c5dacdbbd198f8f82553efb7bccd5b0bd3fe93f3e944eaba7f87c7da5f27a17ad5303e3a8bcf0f0d0fb28c412159da2843c80e05773861f499344ff44b45c39550dbc668574855fb6b642169201d6fed389473546365f1d030e6809273fc7f2d9cbb31e6ffa51e4cbffd8db564aa8d330ede84cad582159ecfdfb99e658b25b0ff4d4cdad66a9a2422eac050ba991f7c469b8669121d17e34b7ad790c898329dba200535aebbfc123586c0d328ae2686aa39854daa73504d4780f5a37cef990fb5b2cbe98ee6cc74d840ec2cf319f3c1ef0dfbf4a372e3dde5ec5174ac4448e3c7bc47e16b6f4a615dd347aec0111c37d8f4be041c1714260e034dbfde9441d99d34aeca2826862cbafca9471bfa332c22bc708a7cc18d1aa9c7d50db57d1e4e0be1be9d2da89460a2ce908858f6fd814e60a54e883ed42043387af966c014cca2c2a3fff513aa4c0006f320ab4539cd2d658ae3dc54226ee0af614b227264afb91ea0fdfb35aa874e51e75e6036c0c7caf9636138e84c55eb608346a0a9868844f44c23a5b8d6d380dbf8508f5d25c871192a5e9393827ac8534dd18c90f22889bd67fdf552d3b491a7063daaeac4b48cbeaccb9ef8e5f8d5159ba99cbdabb1deb2374ea5c1cc9cce1f882f6293b1f4d0512bbddc0d5bff1910c7ba13c7f3f888e371c80c2f16d73407782ec8cf15dbff7ac455b9d70cc4e2eb9094ac243565cb41bd1a8e49b4be1bbeb67486020c1ce4c1afa53dbcedc1e5fa92d54f554d72bf59496a7f52a78bd5ae0633a029f5ad7104723fe72a18c63f785dc347b1eea0f8a3a60ed065e8dfaef950da012641a659198b957ecf26983cc1a6dc15d6faffa8fa215b7bd44c47c2cf671d197d7e37ad4c128a42e5f02a0f152b468601b196f80833ee3148f65b0877a1a49f7bd1ca5152fac35b07ad6f08d0cf439652f275a4388181a7e88eeddfeabc6deefb7d2abdfc11ca63e622049b113a7a3a2a176170bea4ac70bd44a4f662caff5329f0b990627c0cd1bb609c7c88beedba8843b0421c2c022876327deada618153334339930f4d84e6231362520c9841c7fa6dd0fc05af7310b6ea424ba3bfb843d2abdf9e518f678edf96fb3e116233642011c1ceb0aa3d8b0930c602d22686ef42173c80bb4eecdc632f8d782722b278e90dbc6ab8e5deae318b769a86261ed564e8c795b6a7c225e58bf6e3fbb82f6e42ffdfda08e4b4bb05fbe194e608c2d748021dbc18849d1d09eff60e97dd1c9a37cb89196ce93f32d64692f8a09e843c8382fff69d57bc2d06693a9482710865b447748df552efd70653ae76fbf07b89cf1f1fdb2e1c5ed5c9576f9d4036dee053aa36495efa0d000d6e705582709ab0faf1e15bd420dd95bd122f047aa96ba8dab235aedc8621c5a78fe07874d84d4bdf50b5c96c7bbf96aaf0fad137abed12465ccdf6fa0d43d6b9d8a4095949422b8baef98fa9d04e6cf6aec057e64c5b76ee848991d6a035295a7b641bc740c5c61515e213fa6d874ae6094ad7c98c3a4de23a9f20f1835a1cf33a6494f055ea828ec50c372f0e9fb6baf56e622b1bd2430acab40952d1360cdaa3a6b59a703f327a5fe4a189ad2271a9c6e0db27bc581724bac277058204f0c494c5a415cb7d4690e53c8e8cabd16a4b9d860b5664e6362b237aa39cab272115e51733e45c732ea75aa18e198ad1befd9e906f1cd7055184cf", 0x1000}, 0x1006) 17:21:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1548.816323] Dev loop0: unable to read RDB block 6 [ 1548.827532] loop0: unable to read partition table [ 1548.839205] loop0: partition table beyond EOD, truncated [ 1548.857967] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 17:21:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x300, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:11 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x16000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:11 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000e807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:11 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1100, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xc00, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1549.278265] Dev loop0: unable to read RDB block 6 [ 1549.283313] loop0: unable to read partition table [ 1549.317358] loop0: partition table beyond EOD, truncated [ 1549.322975] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1549.401195] device nr0 entered promiscuous mode 17:21:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x200000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1549.458563] Dev loop0: unable to read RDB block 6 [ 1549.467355] loop0: unable to read partition table [ 1549.492163] loop0: partition table beyond EOD, truncated 17:21:12 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1549.530610] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:12 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000f507000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1549.758246] Dev loop0: unable to read RDB block 6 [ 1549.776239] loop0: unable to read partition table [ 1549.812992] loop0: partition table beyond EOD, truncated [ 1549.851741] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1549.968251] Dev loop0: unable to read RDB block 6 [ 1549.974009] loop0: unable to read partition table [ 1550.001642] loop0: partition table beyond EOD, truncated [ 1550.030041] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:13 executing program 1: 17:21:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x700000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:13 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:13 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:13 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007207000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xa00000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:13 executing program 1: 17:21:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1800000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1550.558206] Dev loop0: unable to read RDB block 6 [ 1550.565689] loop0: unable to read partition table [ 1550.585288] loop0: partition table beyond EOD, truncated 17:21:13 executing program 1: 17:21:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x10000000000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1550.634654] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1550.682218] device nr0 entered promiscuous mode 17:21:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xc000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:13 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:13 executing program 1: [ 1550.755058] Dev loop0: unable to read RDB block 6 [ 1550.760191] loop0: unable to read partition table [ 1550.771107] loop0: partition table beyond EOD, truncated [ 1550.782322] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:13 executing program 1: 17:21:13 executing program 1: 17:21:13 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007f07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0xa, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:13 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:13 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:13 executing program 1: 17:21:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x40000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x10000000, 0x0, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1551.308470] Dev loop0: unable to read RDB block 6 [ 1551.317075] loop0: unable to read partition table [ 1551.335286] loop0: partition table beyond EOD, truncated [ 1551.350434] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:13 executing program 1: 17:21:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x59040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x10000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:14 executing program 1: [ 1551.488800] Dev loop0: unable to read RDB block 6 [ 1551.493835] loop0: unable to read partition table [ 1551.514807] device nr0 entered promiscuous mode [ 1551.520026] loop0: partition table beyond EOD, truncated [ 1551.536631] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:14 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000001407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x100000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:14 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1551.738147] Dev loop0: unable to read RDB block 6 [ 1551.752946] loop0: unable to read partition table [ 1551.772781] loop0: partition table beyond EOD, truncated [ 1551.792193] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1551.918178] Dev loop0: unable to read RDB block 6 [ 1551.923200] loop0: unable to read partition table [ 1551.933467] loop0: partition table beyond EOD, truncated [ 1551.939451] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:14 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:14 executing program 1: 17:21:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4a00, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:14 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x431, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:14 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01006000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:14 executing program 1: 17:21:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x700, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1552.119236] Dev loop0: unable to read RDB block 6 [ 1552.130109] loop0: unable to read partition table [ 1552.159395] loop0: partition table beyond EOD, truncated 17:21:14 executing program 1: 17:21:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3f00, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1552.168731] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3f00000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1552.308291] Dev loop0: unable to read RDB block 6 [ 1552.313245] loop0: unable to read partition table [ 1552.338419] device nr0 entered promiscuous mode [ 1552.343332] loop0: partition table beyond EOD, truncated [ 1552.349673] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:15 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100"}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:15 executing program 1: 17:21:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xc, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:15 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:15 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000e007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x57040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:15 executing program 1: 17:21:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x200000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:15 executing program 1: [ 1552.808133] Dev loop0: unable to read RDB block 6 [ 1552.813051] loop0: unable to read partition table [ 1552.841781] loop0: partition table beyond EOD, truncated [ 1552.847478] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:15 executing program 1: [ 1552.944973] device nr0 entered promiscuous mode [ 1552.958386] Dev loop0: unable to read RDB block 6 [ 1552.971544] loop0: unable to read partition table [ 1552.989997] loop0: partition table beyond EOD, truncated [ 1553.008539] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1553.087301] FAT-fs (loop2): bogus number of reserved sectors [ 1553.093144] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1553.341625] FAT-fs (loop2): bogus number of reserved sectors [ 1553.348056] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:15 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xa, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:15 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:15 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000001607000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:15 executing program 1: 17:21:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1200, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:16 executing program 1: [ 1553.498881] Dev loop0: unable to read RDB block 6 [ 1553.512611] loop0: unable to read partition table [ 1553.519298] loop0: partition table beyond EOD, truncated 17:21:16 executing program 1: [ 1553.545864] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x100000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1553.604017] device nr0 entered promiscuous mode 17:21:16 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:16 executing program 1: [ 1553.678288] Dev loop0: unable to read RDB block 6 [ 1553.683490] loop0: unable to read partition table [ 1553.723766] loop0: partition table beyond EOD, truncated [ 1553.732295] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:16 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6104, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:16 executing program 1: 17:21:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff00, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:16 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000a707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:16 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:16 executing program 1: 17:21:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4a00000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1554.129449] Dev loop0: unable to read RDB block 6 [ 1554.134597] loop0: unable to read partition table [ 1554.149308] loop0: partition table beyond EOD, truncated [ 1554.161736] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}], 0x1}}], 0x1, 0x0, 0x0) 17:21:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1554.269280] Dev loop0: unable to read RDB block 6 [ 1554.274365] loop0: unable to read partition table [ 1554.290767] loop0: partition table beyond EOD, truncated [ 1554.307845] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x300000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1554.322179] device nr0 entered promiscuous mode 17:21:16 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1554.397649] FAT-fs (loop2): bogus number of reserved sectors [ 1554.424461] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1554.502483] FAT-fs (loop2): bogus number of reserved sectors [ 1554.517307] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:17 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:17 executing program 1: syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000080)) sendfile(r0, r1, 0x0, 0x2007ff) 17:21:17 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002b07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x2000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:17 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1400000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1554.869547] Dev loop0: unable to read RDB block 6 [ 1554.888758] loop0: unable to read partition table [ 1554.907565] loop0: partition table beyond EOD, truncated [ 1554.913361] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:17 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f551f4) clone(0x2100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file2\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x0, 0x3) 17:21:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1555.018049] Dev loop0: unable to read RDB block 6 [ 1555.023292] loop0: unable to read partition table [ 1555.050416] loop0: partition table beyond EOD, truncated [ 1555.061295] device nr0 entered promiscuous mode [ 1555.066422] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:17 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:18 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:18 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004b07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4a000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:18 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x15000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6204000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xa00, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1555.808750] Dev loop0: unable to read RDB block 6 [ 1555.829673] loop0: unable to read partition table [ 1555.853407] loop0: partition table beyond EOD, truncated [ 1555.877422] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1555.918434] device nr0 entered promiscuous mode 17:21:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xc000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1555.998122] Dev loop0: unable to read RDB block 6 [ 1556.003042] loop0: unable to read partition table [ 1556.027409] loop0: partition table beyond EOD, truncated [ 1556.037602] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1556.117292] FAT-fs (loop2): bogus number of reserved sectors [ 1556.139646] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000080)=0x74) 17:21:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4a, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:18 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:18 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000700ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x300, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1556.308562] Dev loop0: unable to read RDB block 6 [ 1556.313713] loop0: unable to read partition table [ 1556.335192] loop0: partition table beyond EOD, truncated [ 1556.351971] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted [ 1556.353081] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1556.496155] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted [ 1556.497890] FAT-fs (loop2): bogus number of reserved sectors [ 1556.511439] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1556.520975] Dev loop0: unable to read RDB block 6 17:21:19 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x10000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:19 executing program 1: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x80011, r0, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r1, 0x0) 17:21:19 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1556.543778] loop0: unable to read partition table [ 1556.559816] loop0: partition table beyond EOD, truncated [ 1556.565298] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xc000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:19 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1556.725371] FAT-fs (loop2): bogus number of reserved sectors [ 1556.733344] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x2, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1556.789151] FAT-fs (loop2): bogus number of reserved sectors [ 1556.796322] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1556.819008] device nr0 entered promiscuous mode 17:21:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)=0xf) ioctl$TCSETAF(r5, 0x5408, &(0x7f00000006c0)={0x59, 0x7fff, 0x9f2a, 0x9, 0x4, 0x2, 0x3ff, 0x3, 0xfffffffffffffff8, 0x2}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x6d, 0x20000000000014, 0x0, 0x0}, 0x1db) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB="000800000000000c0000051adc7f670a168a1374"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000003c0)={0x84, @local, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20000000000, 0x0, 0x800}, 0x2c) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x16, 0x8, "9b93d7a7e4fb39daab332f2646ffb445fad3e6c64c7d19642a6510b05534a93dd1a7783832ccacc5a22e5745656880afdcaa3e913561c539a8dd796454a735b0", "46e63151428224c434353aedc66eb25afeb82377b1c529267d29919b97a34529", [0x9, 0x3f]}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) mount$overlay(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x2026002, &(0x7f0000000540)={[{@xino_off='xino=off'}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, 'net/tcp6\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f0000000680)={0x2006, 0x4000}) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000700)={0x80000001, 0x9, 0xde5b, 0xa588, 0x401, 0x3, 0x6, 0x10000, 0x8, 0x5e6}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000640)) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}, &(0x7f0000000380)=0x10) poll(&(0x7f0000000440)=[{r7}, {r9, 0x4208}, {r2, 0x401}, {r5, 0x2}, {r8, 0x109}], 0x5, 0x3ff) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0763044002400f00"], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x80000000c1018, r4, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="48000000000000004ae34a266afdc24528000000000000003800000000000000"]], 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7, 0x101000) [ 1556.848770] Dev loop0: unable to read RDB block 6 [ 1556.867728] loop0: unable to read partition table [ 1556.887437] loop0: partition table beyond EOD, truncated 17:21:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3f000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1556.893047] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:19 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1557.028284] Dev loop0: unable to read RDB block 6 [ 1557.041879] loop0: unable to read partition table [ 1557.046886] loop0: partition table beyond EOD, truncated [ 1557.081395] binder: 31776:31778 DecRefs 0 refcount change on invalid ref 999426 ret -22 [ 1557.089421] FAT-fs (loop2): bogus number of reserved sectors [ 1557.097254] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1557.106977] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1557.120333] binder: 31776:31778 unknown command 536872448 [ 1557.126115] binder: 31776:31778 ioctl c0306201 20000400 returned -22 [ 1557.392981] FAT-fs (loop2): bogus number of reserved sectors [ 1557.399594] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:20 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 17:21:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:20 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)=0xf) ioctl$TCSETAF(r5, 0x5408, &(0x7f00000006c0)={0x59, 0x7fff, 0x9f2a, 0x9, 0x4, 0x2, 0x3ff, 0x3, 0xfffffffffffffff8, 0x2}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x6d, 0x20000000000014, 0x0, 0x0}, 0x1db) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB="000800000000000c0000051adc7f670a168a1374"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000003c0)={0x84, @local, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20000000000, 0x0, 0x800}, 0x2c) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x16, 0x8, "9b93d7a7e4fb39daab332f2646ffb445fad3e6c64c7d19642a6510b05534a93dd1a7783832ccacc5a22e5745656880afdcaa3e913561c539a8dd796454a735b0", "46e63151428224c434353aedc66eb25afeb82377b1c529267d29919b97a34529", [0x9, 0x3f]}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) mount$overlay(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x2026002, &(0x7f0000000540)={[{@xino_off='xino=off'}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, 'net/tcp6\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f0000000680)={0x2006, 0x4000}) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000700)={0x80000001, 0x9, 0xde5b, 0xa588, 0x401, 0x3, 0x6, 0x10000, 0x8, 0x5e6}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000640)) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}, &(0x7f0000000380)=0x10) poll(&(0x7f0000000440)=[{r7}, {r9, 0x4208}, {r2, 0x401}, {r5, 0x2}, {r8, 0x109}], 0x5, 0x3ff) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0763044002400f00"], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x80000000c1018, r4, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="48000000000000004ae34a266afdc24528000000000000003800000000000000"]], 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7, 0x101000) 17:21:20 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xb, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xc00, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1557.542659] FAT-fs (loop2): bogus number of reserved sectors [ 1557.558766] Dev loop0: unable to read RDB block 6 [ 1557.560989] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1557.563882] loop0: unable to read partition table [ 1557.592731] loop0: partition table beyond EOD, truncated [ 1557.618250] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1557.646008] binder: 31790:31801 DecRefs 0 refcount change on invalid ref 999426 ret -22 17:21:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x10, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1557.673758] binder: 31790:31801 unknown command 536872448 [ 1557.674680] FAT-fs (loop2): bogus number of reserved sectors [ 1557.685601] binder: 31790:31801 ioctl c0306201 20000400 returned -22 [ 1557.703746] device nr0 entered promiscuous mode [ 1557.711847] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xff00000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1557.757895] Dev loop0: unable to read RDB block 6 [ 1557.762990] loop0: unable to read partition table 17:21:20 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1557.811204] loop0: partition table beyond EOD, truncated 17:21:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)=0xf) ioctl$TCSETAF(r5, 0x5408, &(0x7f00000006c0)={0x59, 0x7fff, 0x9f2a, 0x9, 0x4, 0x2, 0x3ff, 0x3, 0xfffffffffffffff8, 0x2}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x6d, 0x20000000000014, 0x0, 0x0}, 0x1db) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB="000800000000000c0000051adc7f670a168a1374"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000003c0)={0x84, @local, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20000000000, 0x0, 0x800}, 0x2c) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x16, 0x8, "9b93d7a7e4fb39daab332f2646ffb445fad3e6c64c7d19642a6510b05534a93dd1a7783832ccacc5a22e5745656880afdcaa3e913561c539a8dd796454a735b0", "46e63151428224c434353aedc66eb25afeb82377b1c529267d29919b97a34529", [0x9, 0x3f]}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) mount$overlay(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x2026002, &(0x7f0000000540)={[{@xino_off='xino=off'}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, 'net/tcp6\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f0000000680)={0x2006, 0x4000}) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000700)={0x80000001, 0x9, 0xde5b, 0xa588, 0x401, 0x3, 0x6, 0x10000, 0x8, 0x5e6}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000640)) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}, &(0x7f0000000380)=0x10) poll(&(0x7f0000000440)=[{r7}, {r9, 0x4208}, {r2, 0x401}, {r5, 0x2}, {r8, 0x109}], 0x5, 0x3ff) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0763044002400f00"], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x80000000c1018, r4, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="48000000000000004ae34a266afdc24528000000000000003800000000000000"]], 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7, 0x101000) [ 1557.851873] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1558.052092] binder: 31818:31820 DecRefs 0 refcount change on invalid ref 999426 ret -22 [ 1558.086221] binder: 31818:31820 unknown command 536872448 [ 1558.113565] binder: 31818:31820 ioctl c0306201 20000400 returned -22 17:21:20 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, 0x0, 0x0) 17:21:20 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000003307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:20 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xa000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)=0xf) ioctl$TCSETAF(r5, 0x5408, &(0x7f00000006c0)={0x59, 0x7fff, 0x9f2a, 0x9, 0x4, 0x2, 0x3ff, 0x3, 0xfffffffffffffff8, 0x2}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x6d, 0x20000000000014, 0x0, 0x0}, 0x1db) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB="000800000000000c0000051adc7f670a168a1374"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000003c0)={0x84, @local, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20000000000, 0x0, 0x800}, 0x2c) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x16, 0x8, "9b93d7a7e4fb39daab332f2646ffb445fad3e6c64c7d19642a6510b05534a93dd1a7783832ccacc5a22e5745656880afdcaa3e913561c539a8dd796454a735b0", "46e63151428224c434353aedc66eb25afeb82377b1c529267d29919b97a34529", [0x9, 0x3f]}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) mount$overlay(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x2026002, &(0x7f0000000540)={[{@xino_off='xino=off'}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, 'net/tcp6\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f0000000680)={0x2006, 0x4000}) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000700)={0x80000001, 0x9, 0xde5b, 0xa588, 0x401, 0x3, 0x6, 0x10000, 0x8, 0x5e6}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000640)) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}, &(0x7f0000000380)=0x10) poll(&(0x7f0000000440)=[{r7}, {r9, 0x4208}, {r2, 0x401}, {r5, 0x2}, {r8, 0x109}], 0x5, 0x3ff) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0763044002400f00"], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x80000000c1018, r4, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000480)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="48000000000000004ae34a266afdc24528000000000000003800000000000000"]], 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7, 0x101000) [ 1558.398270] Dev loop0: unable to read RDB block 6 [ 1558.403186] loop0: unable to read partition table [ 1558.430370] loop0: partition table beyond EOD, truncated 17:21:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xc00000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1558.445043] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x7, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1558.558805] binder: 31830:31837 DecRefs 0 refcount change on invalid ref 999426 ret -22 [ 1558.558867] Dev loop0: unable to read RDB block 6 [ 1558.584654] loop0: unable to read partition table [ 1558.590509] binder: 31830:31837 unknown command 536872448 [ 1558.596210] binder: 31830:31837 ioctl c0306201 20000400 returned -22 [ 1558.599847] device nr0 entered promiscuous mode 17:21:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:21 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1558.617639] loop0: partition table beyond EOD, truncated [ 1558.623363] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x700000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:21 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01230000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1558.816611] FAT-fs (loop2): bogus number of reserved sectors [ 1558.827552] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1558.888346] Dev loop0: unable to read RDB block 6 [ 1558.902709] loop0: unable to read partition table [ 1558.927346] loop0: partition table beyond EOD, truncated [ 1558.952229] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:21 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, 0x0, 0x0) 17:21:21 executing program 1: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000004807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xa00000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:21 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x459, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1559.153943] FAT-fs (loop2): bogus number of reserved sectors [ 1559.160211] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1559.160385] Dev loop0: unable to read RDB block 6 [ 1559.172336] loop0: unable to read partition table [ 1559.177786] loop0: partition table beyond EOD, truncated [ 1559.183348] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0xffffffff00000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:21 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000e407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1559.306354] FAT-fs (loop2): bogus number of reserved sectors [ 1559.307968] Dev loop1: unable to read RDB block 6 [ 1559.317304] loop1: unable to read partition table [ 1559.325188] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1559.332595] loop1: partition table beyond EOD, truncated 17:21:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000000000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1559.354196] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 17:21:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x40000000, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1559.399259] FAT-fs (loop2): bogus number of reserved sectors [ 1559.409774] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1559.428554] Dev loop0: unable to read RDB block 6 [ 1559.444111] loop0: unable to read partition table 17:21:22 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100"}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1559.467532] loop0: partition table beyond EOD, truncated [ 1559.491157] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:22 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xe000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1559.521882] device nr0 entered promiscuous mode [ 1559.628359] Dev loop0: unable to read RDB block 6 [ 1559.638277] loop0: unable to read partition table [ 1559.649021] loop0: partition table beyond EOD, truncated [ 1559.661207] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1559.988905] device nr0 entered promiscuous mode 17:21:22 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, 0x0, 0x0) 17:21:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x3, 0x2a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:22 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000b007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:22 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x27000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x56, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1560.108166] Dev loop0: unable to read RDB block 6 [ 1560.113170] loop0: unable to read partition table [ 1560.129649] loop0: partition table beyond EOD, truncated [ 1560.157724] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1560.207847] FAT-fs (loop2): bogus number of reserved sectors [ 1560.226138] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1560.288430] Dev loop0: unable to read RDB block 6 [ 1560.293332] loop0: unable to read partition table [ 1560.325056] loop0: partition table beyond EOD, truncated 17:21:22 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1560.338814] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:23 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000300ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1560.565380] FAT-fs (loop2): bogus number of reserved sectors [ 1560.571718] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1560.583950] Dev loop0: unable to read RDB block 6 [ 1560.589655] loop0: unable to read partition table [ 1560.594999] loop0: partition table beyond EOD, truncated [ 1560.600893] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1560.632442] device nr0 entered promiscuous mode 17:21:23 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r1, &(0x7f0000000000), 0x17b) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 17:21:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1d00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1560.699036] Dev loop0: unable to read RDB block 6 [ 1560.704308] loop0: unable to read partition table [ 1560.725348] loop0: partition table beyond EOD, truncated [ 1560.745792] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1561.185964] device nr0 entered promiscuous mode 17:21:23 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000e107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:23 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000002c0)={0x4, 0xffffffffffffffff}) mq_unlink(&(0x7f0000000000)='\x00') ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x141041, 0x0) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) write$sndseq(r3, &(0x7f00000004c0)=[{0xffffffff, 0x20, 0x3f, 0x7, @time={0x0, 0x1c9c380}, {0x6, 0x5}, {0x3, 0xa9}, @addr={0x3, 0x7}}, {0x3, 0x1, 0x2, 0x6, @tick=0xda8, {0xfffffffffffffffd}, {0x53ce}, @result={0x8, 0x2}}, {0x43ee, 0x1, 0x2, 0x4000000000000000, @time={0x0, 0x989680}, {0x1, 0x4}, {0x1ff, 0xff}, @quote={{0x8, 0x3}, 0x1, &(0x7f0000000340)={0x8, 0x3, 0x7fffffff, 0x3, @time={0x0, 0x1c9c380}, {0x3, 0xb08}, {0x7, 0x1000}, @raw32={[0xfff, 0xfffffffffffffeff, 0xffffffffffff8654]}}}}, {0x2, 0x2, 0x5, 0x80, @tick=0xea5a, {0x100000000, 0x400}, {0x0, 0x10001}, @time=@tick=0x6}, {0x93, 0x7, 0x1, 0x4, @time={r4, r5+10000000}, {0xc5c, 0x1ff}, {0x39a, 0x401}, @connect={{0x100000001, 0x800}, {0x2, 0x78e}}}], 0xf0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000100)=""/189, 0xbd}, {&(0x7f00000001c0)=""/106, 0x6a}], 0x4, 0x0) r6 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x1, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f00000005c0)="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") 17:21:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5f04, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc0, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:23 executing program 4 (fault-call:10 fault-nth:0): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) [ 1561.358190] Dev loop0: unable to read RDB block 6 [ 1561.374910] loop0: unable to read partition table [ 1561.394796] loop0: partition table beyond EOD, truncated [ 1561.427841] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:24 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1561.540441] Dev loop0: unable to read RDB block 6 [ 1561.546649] loop0: unable to read partition table [ 1561.565788] loop0: partition table beyond EOD, truncated [ 1561.585169] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:24 executing program 1 (fault-call:7 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) 17:21:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x57, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:24 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1561.779453] device nr0 entered promiscuous mode 17:21:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x457, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:24 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x43, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1561.958873] Dev loop0: unable to read RDB block 6 [ 1561.971028] loop0: unable to read partition table [ 1561.987462] loop0: partition table beyond EOD, truncated [ 1561.997816] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x4}, 0x50) [ 1562.050553] FAT-fs (loop2): bogus number of reserved sectors [ 1562.087439] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x59, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1562.333612] FAT-fs (loop2): bogus number of reserved sectors [ 1562.343243] Dev loop0: unable to read RDB block 6 [ 1562.358107] loop0: unable to read partition table [ 1562.363159] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1562.377034] loop0: partition table beyond EOD, truncated 17:21:24 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:24 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0xf, 0x0, 0x4}, 0x50) [ 1562.387894] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1562.431762] [ 1562.439836] ********************************************************** [ 1562.462064] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** 17:21:25 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005207000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1562.483935] ** ** [ 1562.504807] ** trace_printk() being used. Allocating extra memory. ** [ 1562.534385] ** ** [ 1562.566858] ** This means that this is a DEBUG kernel and it is ** [ 1562.573865] ** unsafe for production use. ** [ 1562.581226] ** ** [ 1562.588747] ** If you see this message and you are not debugging ** [ 1562.607355] ** the kernel, report this immediately to your vendor! ** [ 1562.614273] ** ** [ 1562.623487] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 1562.631228] Dev loop0: unable to read RDB block 6 [ 1562.637357] loop0: unable to read partition table [ 1562.647003] loop0: partition table beyond EOD, truncated [ 1562.652692] ********************************************************** [ 1562.666334] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:25 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1562.681033] device nr0 entered promiscuous mode 17:21:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2d, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1562.799423] Dev loop0: unable to read RDB block 6 [ 1562.804450] loop0: unable to read partition table [ 1562.818963] loop0: partition table beyond EOD, truncated [ 1562.832100] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:25 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1563.059189] Dev loop0: unable to read RDB block 6 [ 1563.065388] loop0: unable to read partition table [ 1563.077427] loop0: partition table beyond EOD, truncated [ 1563.089977] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:25 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x20000152) 17:21:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1563.264306] Dev loop0: unable to read RDB block 6 [ 1563.277441] loop0: unable to read partition table [ 1563.282554] loop0: partition table beyond EOD, truncated [ 1563.294962] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:25 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x10, 0x0, 0x4}, 0x50) 17:21:25 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000dd07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1563.429303] FAT-fs (loop2): bogus number of reserved sectors [ 1563.437309] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x51, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1563.498595] FAT-fs (loop2): bogus number of reserved sectors [ 1563.508394] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1563.513710] device nr0 entered promiscuous mode [ 1563.528704] Dev loop0: unable to read RDB block 6 [ 1563.534989] loop0: unable to read partition table 17:21:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x60040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1563.548549] loop0: partition table beyond EOD, truncated [ 1563.560845] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:26 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x58, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1563.669698] Dev loop0: unable to read RDB block 6 [ 1563.674825] loop0: unable to read partition table [ 1563.692967] loop0: partition table beyond EOD, truncated [ 1563.709450] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:26 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) statx(r1, &(0x7f0000000040)='./file0\x00', 0x4400, 0xfff, &(0x7f0000000180)) 17:21:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4a, 0x27}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:26 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000006e07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:26 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5b040000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x200003d0, 0x0, 0x4}, 0x50) 17:21:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff85}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1564.188226] Dev loop0: unable to read RDB block 6 [ 1564.193140] loop0: unable to read partition table [ 1564.217296] loop0: partition table beyond EOD, truncated [ 1564.222792] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1564.301275] device nr0 entered promiscuous mode 17:21:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x75}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:27 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x1018}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1564.379728] Dev loop0: unable to read RDB block 6 [ 1564.384652] loop0: unable to read partition table [ 1564.398145] loop0: partition table beyond EOD, truncated [ 1564.417337] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:27 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01090000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x45}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1564.598319] Dev loop0: unable to read RDB block 6 [ 1564.609715] loop0: unable to read partition table [ 1564.627559] loop0: partition table beyond EOD, truncated [ 1564.645256] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1564.868344] Dev loop0: unable to read RDB block 6 [ 1564.873708] loop0: unable to read partition table [ 1564.879260] loop0: partition table beyond EOD, truncated [ 1564.884893] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:27 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0x45, 0x0, 0xd3, 0x1f, 0x6, 0xffffffffffffffcf}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xf}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:27 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:27 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01040000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1565.009243] FAT-fs (loop2): bogus number of reserved sectors [ 1565.015096] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1565.073981] FAT-fs (loop2): bogus number of reserved sectors [ 1565.080417] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1565.108458] Dev loop0: unable to read RDB block 6 [ 1565.113743] loop0: unable to read partition table 17:21:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x10, 0x4}, 0x50) 17:21:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x44}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x45b, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1565.147841] loop0: partition table beyond EOD, truncated [ 1565.171527] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffbc}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1565.220011] device nr0 entered promiscuous mode 17:21:27 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1565.287379] FAT-fs (loop2): bogus number of reserved sectors [ 1565.311254] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1565.338899] Dev loop0: unable to read RDB block 6 [ 1565.343898] loop0: unable to read partition table [ 1565.367387] loop0: partition table beyond EOD, truncated [ 1565.373044] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x6d}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:28 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007e07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1565.450607] FAT-fs (loop2): bogus number of reserved sectors [ 1565.456617] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1565.647600] Dev loop0: unable to read RDB block 6 [ 1565.657442] loop0: unable to read partition table [ 1565.682598] loop0: partition table beyond EOD, truncated [ 1565.707306] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1565.828182] Dev loop0: unable to read RDB block 6 [ 1565.835424] loop0: unable to read partition table [ 1565.851842] loop0: partition table beyond EOD, truncated [ 1565.870898] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:28 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x70, 0x400) read$FUSE(r2, &(0x7f00000006c0), 0x1000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000000c0)={0x3, 0x0}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000100)={0x2, r3, 0x1, 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)="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") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0x17) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r5, 0x54a3) write$cgroup_int(r4, &(0x7f0000000000), 0x17b) write$cgroup_pid(r4, &(0x7f0000000140), 0x12) 17:21:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x79}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:28 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:28 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000d607000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x8, 0x4}, 0x50) 17:21:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x71}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1566.198909] Dev loop0: unable to read RDB block 6 [ 1566.217769] loop0: unable to read partition table [ 1566.241489] loop0: partition table beyond EOD, truncated [ 1566.247374] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x34}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1566.378229] Dev loop0: unable to read RDB block 6 [ 1566.383292] loop0: unable to read partition table [ 1566.415647] device nr0 entered promiscuous mode [ 1566.420750] loop0: partition table beyond EOD, truncated 17:21:29 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffd4}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1566.438501] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:29 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000002c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1566.648308] Dev loop0: unable to read RDB block 6 [ 1566.660456] loop0: unable to read partition table [ 1566.675088] loop0: partition table beyond EOD, truncated [ 1566.690130] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1566.798303] Dev loop0: unable to read RDB block 6 [ 1566.804728] loop0: unable to read partition table [ 1566.818525] loop0: partition table beyond EOD, truncated [ 1566.832136] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:29 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x6a}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:29 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005e07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:29 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff57) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x22800, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="78020000", @ANYRES16=r5, @ANYBLOB="020025bd7000fedbdf2506000000540007000c000400ff070000000000000c000300ffff00000000000008000200010001000c000400040000000000000008000200ff03000008000200000800000c0003007e08000000000000080001001f0000007c000100380004001400010002004e23ffffffff0000000000000000200002000a004e210800000000000000000000000000ffff0000001f0200000038000400200001000a004e230000000000000000000000000000000000000000090000001400020002004e22ac1414aa000000000000000008000300030000004c0007000c00040000000100000000000c000400ffffff7f000000000c000400feffffffffffffff08000200090000000c0003005500080000000000080002000200000008000200010400006000010014000200080004000000000008000200840000001000010069623a677265746170300000380004001400010002004e247f0000010000000000000000200002000a004e2002000000ff020000000000000000000000000001690a0000a4000500540002000800030006000000080004000180000008000100190000000800010011000000080001001a0000000800040008000000080003000800000008000400b7870000080001000f00000008000200ce00000044000200080003006405000008000100030000000800040008000000080004000100000008000400000000000800030005000000080003000100000008000200000000000800010069620000180007000c000300000000000000000008000100430500002c00090008000100ff00000008000200b1c60000080001000200000008000200010000000800010007000000"], 0x278}}, 0x240400c0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 17:21:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffdc}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x100000000000000, 0x4}, 0x50) [ 1567.151303] Dev loop0: unable to read RDB block 6 [ 1567.159062] loop0: unable to read partition table [ 1567.168834] loop0: partition table beyond EOD, [ 1567.168846] truncated [ 1567.168889] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x17}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:29 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt(r0, 0x0, 0x64, &(0x7f00000009c0)="3723c5bab665706b44b107004c54dead66178ba25e537271394a9d336aa900774124edbcc6c55fce1c3b73ac9c1d350b69", 0x31) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) recvmsg$kcm(r2, &(0x7f0000000740)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/15, 0xf}, {&(0x7f0000000180)=""/179, 0xb3}, {&(0x7f0000000100)=""/18, 0x12}, {&(0x7f0000000240)=""/38, 0x26}, {&(0x7f0000000340)=""/195, 0xc3}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000440)=""/107, 0x6b}, {&(0x7f00000004c0)=""/210, 0xd2}], 0x8, &(0x7f0000000640)=""/221, 0xdd}, 0x10020) write$nbd(r3, &(0x7f0000000940)={0x67446698, 0x0, 0x3, 0x3, 0x2, "504baa5439ca7ae8b3db08287eae4aeb4ccc43f46d2546fe74e7103f701a6fb9bad7332262da8e0bdec5cfcc7c509857374d49f6350862763ffe525c18"}, 0x4d) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r4, &(0x7f0000000000), 0x17b) write$cgroup_pid(r4, &(0x7f0000000140), 0x12) 17:21:29 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x800000000000000, 0x4}, 0x50) [ 1567.325454] Dev loop0: unable to read RDB block 6 [ 1567.331133] loop0: unable to read partition table [ 1567.352214] loop0: partition table beyond EOD, truncated [ 1567.361651] FAT-fs (loop2): bogus number of reserved sectors 17:21:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x7d}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1567.387379] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1567.393416] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:30 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000000707000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffdd}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1567.469756] FAT-fs (loop2): bogus number of reserved sectors [ 1567.485163] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1567.588655] Dev loop0: unable to read RDB block 6 [ 1567.602048] loop0: unable to read partition table [ 1567.626407] loop0: partition table beyond EOD, truncated 17:21:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x2f}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x1000000000000000, 0x4}, 0x50) [ 1567.636801] device nr0 entered promiscuous mode [ 1567.645522] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffad}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:30 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x4f}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1567.758335] Dev loop0: unable to read RDB block 6 [ 1567.764168] loop0: unable to read partition table [ 1567.779473] loop0: partition table beyond EOD, truncated [ 1567.792394] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x100) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x4, {0x401, 0x378c4056, "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", 0x30, 0xbc3b, 0x1, 0x7f, 0x0, 0x2, 0x6}, r4}}, 0x128) 17:21:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2c, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x1c}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x4000000000000000, 0x4}, 0x50) 17:21:31 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01000000ef07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:31 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x6c}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1568.668319] Dev loop0: unable to read RDB block 6 [ 1568.675722] loop0: unable to read partition table [ 1568.693357] loop0: partition table beyond EOD, truncated [ 1568.700216] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xf00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffa7}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1568.811470] device nr0 entered promiscuous mode [ 1568.818409] Dev loop0: unable to read RDB block 6 [ 1568.823467] loop0: unable to read partition table [ 1568.837835] loop0: partition table beyond EOD, truncated [ 1568.849274] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:31 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1568.860174] FAT-fs (loop2): bogus number of reserved sectors [ 1568.869643] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:31 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009907000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x5f}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1568.974984] FAT-fs (loop2): bogus number of reserved sectors [ 1568.983414] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1569.119461] Dev loop0: unable to read RDB block 6 [ 1569.124377] loop0: unable to read partition table [ 1569.147343] loop0: partition table beyond EOD, truncated [ 1569.167346] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1569.299633] Dev loop0: unable to read RDB block 6 [ 1569.304560] loop0: unable to read partition table [ 1569.318635] loop0: partition table beyond EOD, truncated [ 1569.326721] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:32 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x72}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1b00, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:32 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) r3 = getpgid(0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) 17:21:32 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000007c07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x3f000000, 0x4}, 0x50) 17:21:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffc3}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1569.570909] Dev loop0: unable to read RDB block 6 [ 1569.581664] loop0: unable to read partition table [ 1569.602184] loop0: partition table beyond EOD, truncated [ 1569.616108] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x15}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1569.661182] device nr0 entered promiscuous mode 17:21:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:32 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1569.748385] Dev loop0: unable to read RDB block 6 [ 1569.753299] loop0: unable to read partition table [ 1569.767417] loop0: partition table beyond EOD, truncated [ 1569.772928] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:32 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01002300ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xc}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1569.988267] Dev loop0: unable to read RDB block 6 17:21:32 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1570.017827] loop0: unable to read partition table [ 1570.025369] loop0: partition table beyond EOD, truncated [ 1570.057288] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x65}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1570.248125] Dev loop0: unable to read RDB block 6 [ 1570.253075] loop0: unable to read partition table [ 1570.258147] loop0: partition table beyond EOD, truncated [ 1570.263624] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:32 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x72d, 0x40000) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x5, 0x40a, 0x32, 0x72}, {0x1, 0x2, 0x3ff, 0x163}, {0x3, 0x2, 0x8, 0x6}, {0xfffffffffffffffb, 0x9a72, 0x2, 0xdd}, {0x7, 0x100, 0x80000001, 0x100000000}]}) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r2, &(0x7f0000000000), 0xfdba) write$cgroup_pid(r3, &(0x7f0000000140), 0xfffffffffffffca9) 17:21:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x61}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x1000000, 0x4}, 0x50) 17:21:32 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000009307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xd, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x4}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:33 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1570.479358] Dev loop0: unable to read RDB block 6 [ 1570.484397] loop0: unable to read partition table [ 1570.502001] loop0: partition table beyond EOD, truncated [ 1570.512886] FAT-fs (loop2): bogus number of reserved sectors 17:21:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x7}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1570.523598] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1570.526640] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x3d}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1570.607254] FAT-fs (loop2): bogus number of reserved sectors [ 1570.613124] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1570.628063] Dev loop0: unable to read RDB block 6 [ 1570.630890] device nr0 entered promiscuous mode [ 1570.632953] loop0: unable to read partition table [ 1570.633027] loop0: partition table beyond EOD, truncated [ 1570.633046] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:33 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000006607000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2612, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:33 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 1570.889045] Dev loop0: unable to read RDB block 6 [ 1570.894248] loop0: unable to read partition table [ 1570.900017] loop0: partition table beyond EOD, truncated [ 1570.906981] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1571.028053] Dev loop0: unable to read RDB block 6 [ 1571.032963] loop0: unable to read partition table [ 1571.047311] loop0: partition table beyond EOD, truncated [ 1571.052793] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x62}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:33 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff010000005007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 17:21:33 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) close(r1) socket$kcm(0x2, 0x15, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r3 = dup3(r0, r1, 0x80001) write$UHID_DESTROY(r3, &(0x7f0000000040), 0x4) write$cgroup_int(r2, &(0x7f0000000000), 0x17b) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) 17:21:33 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000340)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x8000000, 0x4}, 0x50) 17:21:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x6104000000000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x37}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1571.318477] Dev loop0: unable to read RDB block 6 [ 1571.323743] loop0: unable to read partition table [ 1571.339714] loop0: partition table beyond EOD, truncated [ 1571.357654] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffffcc}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 17:21:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) 17:21:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff97}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1571.478211] Dev loop0: unable to read RDB block 6 [ 1571.487723] loop0: unable to read partition table [ 1571.498143] loop0: partition table beyond EOD, truncated [ 1571.510279] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 17:21:34 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)="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") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) r4 = geteuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r4, r5) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0x17b) keyctl$session_to_parent(0x12) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 17:21:34 executing program 5: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000040200060000110000"], 0x18) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 17:21:34 executing program 0: syz_read_part_table(0xdc2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="0200eeffffff01006000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1571.586372] FAT-fs (loop2): bogus number of reserved sectors [ 1571.600200] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x35}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1571.668375] FAT-fs (loop2): bogus number of reserved sectors [ 1571.689689] FAT-fs (loop2): Can't find a valid FAT filesystem 17:21:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x7a}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 1571.741494] Dev loop0: unable to read RDB block 6 [ 1571.750905] loop0: unable to read partition table [ 1571.773301] loop0: partition table beyond EOD, truncated 17:21:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x5c04, &(0x7f0000000640)={[{@fat=@check_normal='check=normal'}]}) [ 1571.796863] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1571.838195] device nr0 entered promiscuous mode [ 1571.856852] BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 [ 1571.864833] PGD 1ce9d1067 P4D 1ce9d1067 PUD 1ad007067 PMD 0 [ 1571.870634] Oops: 0010 [#1] PREEMPT SMP KASAN [ 1571.875122] CPU: 1 PID: 32446 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #152 [ 1571.882469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1571.891813] RIP: 0010: (null) [ 1571.895704] Code: Bad RIP value. [ 1571.899065] RSP: 0018:ffff8881daf07868 EFLAGS: 00010246 [ 1571.904447] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff862f4814 [ 1571.911726] RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffff8881b6f22618 [ 1571.918992] RBP: ffff8881daf07df8 R08: ffff888178dae4c0 R09: 0000000000000000 [ 1571.926255] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 1571.933517] R13: dffffc0000000000 R14: ffff8881daf07dd0 R15: ffff8881b6f22618 [ 1571.940785] FS: 00007f909d51b700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000 [ 1571.949005] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1571.954881] CR2: ffffffffffffffd6 CR3: 00000001d1bb9000 CR4: 00000000001426e0 [ 1571.962166] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1571.969431] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1571.976715] Call Trace: [ 1571.979288] [ 1571.981506] ? net_rx_action+0x7fa/0x19b0 [ 1571.985661] ? napi_complete_done+0x7c0/0x7c0 [ 1571.990168] ? migrate_swap_stop+0x8a0/0x8a0 [ 1571.994571] ? lock_downgrade+0x900/0x900 [ 1571.998743] ? find_held_lock+0x36/0x1c0 [ 1572.002834] ? zap_class+0x640/0x640 [ 1572.006558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1572.012114] ? kasan_check_read+0x11/0x20 [ 1572.016258] ? do_raw_spin_lock+0x14f/0x350 [ 1572.020580] ? find_held_lock+0x36/0x1c0 [ 1572.024645] ? clockevents_program_event+0x158/0x370 [ 1572.029750] ? lock_downgrade+0x900/0x900 [ 1572.033890] ? zap_class+0x640/0x640 [ 1572.037648] ? pvclock_read_flags+0x160/0x160 [ 1572.042164] ? hrtimer_start_range_ns+0xe00/0xe00 [ 1572.047002] ? trace_hardirqs_on+0x310/0x310 [ 1572.051618] ? kvm_clock_read+0x18/0x30 [ 1572.055587] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1572.060597] ? ktime_get+0x2c1/0x400 [ 1572.064311] ? pvclock_read_flags+0x160/0x160 [ 1572.068804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1572.074336] ? check_preemption_disabled+0x48/0x280 [ 1572.079356] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1572.084888] ? rcu_pm_notify+0xc0/0xc0 [ 1572.088784] __do_softirq+0x308/0xb7e [ 1572.092586] ? __irqentry_text_end+0x1f9658/0x1f9658 [ 1572.097693] ? irq_exit+0xbd/0x1c0 [ 1572.101229] ? smp_apic_timer_interrupt+0x1cb/0x760 [ 1572.106237] ? smp_reschedule_interrupt+0x109/0x650 [ 1572.111251] ? smp_call_function_single_interrupt+0x650/0x650 [ 1572.117128] ? ret_from_intr+0xb/0x1e [ 1572.120925] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1572.125940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1572.130797] ? trace_hardirqs_on_caller+0x310/0x310 [ 1572.135823] ? task_prio+0x50/0x50 [ 1572.139362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1572.144900] ? check_preemption_disabled+0x48/0x280 [ 1572.149917] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1572.154826] ? tun_get_user+0x1bf5/0x4250 [ 1572.158972] do_softirq_own_stack+0x2a/0x40 [ 1572.163281] [ 1572.165515] do_softirq.part.14+0x126/0x160 [ 1572.169833] __local_bh_enable_ip+0x21d/0x260 [ 1572.174322] tun_get_user+0x1c0b/0x4250 [ 1572.178320] ? tun_net_xmit+0x1c90/0x1c90 [ 1572.182984] ? zap_class+0x640/0x640 [ 1572.186717] ? __fget+0x4aa/0x740 [ 1572.190168] ? lock_downgrade+0x900/0x900 [ 1572.194311] ? check_preemption_disabled+0x48/0x280 [ 1572.199326] ? find_held_lock+0x36/0x1c0 [ 1572.203385] ? tun_get+0x206/0x370 [ 1572.206918] ? lock_downgrade+0x900/0x900 [ 1572.211065] ? check_preemption_disabled+0x48/0x280 [ 1572.216076] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1572.221003] ? kasan_check_read+0x11/0x20 [ 1572.225158] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1572.230448] ? rcu_softirq_qs+0x20/0x20 [ 1572.234424] ? tun_get+0x22d/0x370 [ 1572.237981] ? tun_chr_close+0x180/0x180 [ 1572.242052] tun_chr_write_iter+0xb9/0x160 [ 1572.246300] __vfs_write+0x6b8/0x9f0 [ 1572.250014] ? kernel_read+0x120/0x120 [ 1572.253899] ? __might_sleep+0x95/0x190 [ 1572.257888] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1572.263440] ? __inode_security_revalidate+0xd9/0x120 [ 1572.268643] ? selinux_file_permission+0x90/0x540 [ 1572.273492] ? rw_verify_area+0x118/0x360 [ 1572.277636] vfs_write+0x1fc/0x560 [ 1572.281199] ksys_write+0x101/0x260 [ 1572.284822] ? __ia32_sys_read+0xb0/0xb0 [ 1572.288883] ? trace_hardirqs_off_caller+0x310/0x310 [ 1572.293982] __x64_sys_write+0x73/0xb0 [ 1572.297868] do_syscall_64+0x1b9/0x820 [ 1572.301748] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1572.307111] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1572.312040] ? trace_hardirqs_on_caller+0x310/0x310 [ 1572.317052] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1572.322066] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1572.328727] ? __switch_to_asm+0x40/0x70 [ 1572.332780] ? __switch_to_asm+0x34/0x70 [ 1572.336840] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1572.341686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1572.346869] RIP: 0033:0x457659 [ 1572.350063] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1572.368960] RSP: 002b:00007f909d51ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1572.376659] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 1572.383942] RDX: 000000000000017b RSI: 0000000020000000 RDI: 0000000000000008 [ 1572.391204] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1572.398471] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f909d51b6d4 [ 1572.405732] R13: 00000000004c60bd R14: 00000000004dac58 R15: 00000000ffffffff [ 1572.413011] Modules linked in: [ 1572.416200] CR2: 0000000000000000 [ 1572.419651] ---[ end trace 2547caebfe5e16d7 ]--- [ 1572.424407] RIP: 0010: (null) [ 1572.428330] Code: Bad RIP value. [ 1572.431696] RSP: 0018:ffff8881daf07868 EFLAGS: 00010246 [ 1572.437048] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff862f4814 [ 1572.444313] RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffff8881b6f22618 [ 1572.451574] RBP: ffff8881daf07df8 R08: ffff888178dae4c0 R09: 0000000000000000 [ 1572.458836] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 1572.466097] R13: dffffc0000000000 R14: ffff8881daf07dd0 R15: ffff8881b6f22618 [ 1572.473382] FS: 00007f909d51b700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000 [ 1572.481614] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1572.487490] CR2: ffffffffffffffd6 CR3: 00000001d1bb9000 CR4: 00000000001426e0 [ 1572.494753] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1572.502018] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1572.509280] Kernel panic - not syncing: Fatal exception in interrupt [ 1572.516864] Kernel Offset: disabled [ 1572.520526] Rebooting in 86400 seconds..