fffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa300050000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:45 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:45 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 21:12:45 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xedc0) [ 1932.567948] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:12:46 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfa03) [ 1932.817488] Dev loop3: unable to read RDB block 1 [ 1932.817838] loop3: unable to read partition table 21:12:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1932.818543] loop3: partition table beyond EOD, truncated [ 1932.818633] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1932.894470] Dev loop4: unable to read RDB block 1 [ 1932.894994] loop4: unable to read partition table 21:12:46 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1932.895948] loop4: partition table beyond EOD, truncated [ 1932.896088] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:12:46 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1933.115441] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1933.130010] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:12:46 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xff0f) 21:12:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}) [ 1933.278536] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1933.398828] Dev loop4: unable to read RDB block 1 [ 1933.418668] loop4: unable to read partition table [ 1933.435385] Dev loop3: unable to read RDB block 1 [ 1933.435533] loop3: unable to read partition table [ 1933.435802] loop3: partition table beyond EOD, truncated 21:12:46 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1933.435855] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1933.448500] loop4: partition table beyond EOD, truncated [ 1933.448557] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1933.655280] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1933.708245] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:12:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e2244", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:46 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:47 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x20000) 21:12:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}) [ 1933.895538] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1933.915072] Dev loop3: unable to read RDB block 1 [ 1933.915201] loop3: unable to read partition table [ 1933.915453] loop3: partition table beyond EOD, truncated [ 1933.915493] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:12:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:47 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1934.096779] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1934.109759] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1934.126239] Dev loop4: unable to read RDB block 1 [ 1934.126554] loop4: unable to read partition table [ 1934.127333] loop4: partition table beyond EOD, truncated [ 1934.127418] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1934.184697] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:12:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:47 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x40000) [ 1934.337777] Dev loop3: unable to read RDB block 1 21:12:47 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:47 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xe0000) [ 1934.364767] loop3: unable to read partition table [ 1934.365051] loop3: partition table beyond EOD, truncated [ 1934.365106] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1934.740678] loop4: p1 < > p2 p3 < p5 p6 > p4 21:12:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}) [ 1934.803604] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1934.828604] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1934.848274] loop0: p1 < > p2 p3 < p5 p6 > p4 21:12:48 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1934.895993] Dev loop3: unable to read RDB block 1 21:12:48 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1934.896107] loop3: unable to read partition table [ 1934.896377] loop3: partition table beyond EOD, truncated [ 1934.896430] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1934.925861] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1935.009920] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:12:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:48 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1fffff) 21:12:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}) 21:12:48 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1935.453712] Dev loop1: unable to read RDB block 1 [ 1935.453836] loop1: unable to read partition table [ 1935.454061] loop1: partition table beyond EOD, truncated 21:12:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1935.454115] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1935.503044] Dev loop3: unable to read RDB block 1 [ 1935.503394] loop3: unable to read partition table [ 1935.503986] loop3: partition table beyond EOD, truncated [ 1935.504038] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1935.652035] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1935.688705] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:12:48 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:48 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:49 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x400000) [ 1935.722795] Dev loop4: unable to read RDB block 1 [ 1935.722926] loop4: unable to read partition table 21:12:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 1935.731480] loop4: partition table beyond EOD, truncated [ 1935.731644] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1935.796649] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1935.950858] Dev loop3: unable to read RDB block 1 [ 1935.958212] loop3: unable to read partition table 21:12:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4}) [ 1936.012100] loop3: partition table beyond EOD, truncated [ 1936.013199] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1936.056204] Dev loop1: unable to read RDB block 1 [ 1936.056502] loop1: unable to read partition table [ 1936.057397] loop1: partition table beyond EOD, truncated [ 1936.057435] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:12:49 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x6b6b6b) 21:12:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:49 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:49 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 1936.278969] Dev loop4: unable to read RDB block 1 [ 1936.303319] loop4: unable to read partition table [ 1936.324867] loop4: partition table beyond EOD, truncated 21:12:49 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1000000) [ 1936.358221] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:12:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10}) [ 1936.578633] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1936.581556] Dev loop3: unable to read RDB block 1 [ 1936.588282] loop3: unable to read partition table [ 1936.598964] loop3: partition table beyond EOD, truncated [ 1936.619572] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:12:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3000500", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1936.639993] Dev loop3: unable to read RDB block 1 [ 1936.648234] loop3: unable to read partition table [ 1936.648552] loop3: partition table beyond EOD, truncated [ 1936.648776] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1936.655508] Dev loop1: unable to read RDB block 1 [ 1936.655623] loop1: unable to read partition table [ 1936.655908] loop1: partition table beyond EOD, truncated [ 1936.655962] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1936.753613] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:12:49 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x2000000) 21:12:50 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 21:12:50 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000}) 21:12:50 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x3000000) 21:12:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1937.197755] Dev loop3: unable to read RDB block 1 [ 1937.208323] loop3: unable to read partition table [ 1937.220252] loop3: partition table beyond EOD, truncated [ 1937.229372] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:12:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4000}) [ 1937.354940] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1937.369122] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1937.390633] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1937.398414] Dev loop1: unable to read RDB block 1 [ 1937.406798] Dev loop3: unable to read RDB block 1 [ 1937.411951] loop3: unable to read partition table [ 1937.418889] loop1: unable to read partition table [ 1937.420337] loop3: partition table beyond EOD, truncated [ 1937.429801] loop1: partition table beyond EOD, truncated [ 1937.439452] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:12:50 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x4000000) 21:12:50 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 21:12:50 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xff00}) [ 1937.797471] Dev loop3: unable to read RDB block 1 [ 1937.803903] loop3: unable to read partition table [ 1937.810379] loop3: partition table beyond EOD, truncated [ 1937.817380] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1937.849673] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1937.904162] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:12:51 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x5000000) [ 1937.948453] Dev loop1: unable to read RDB block 1 [ 1937.949499] loop1: unable to read partition table [ 1937.956729] loop1: partition table beyond EOD, truncated [ 1937.957317] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:12:51 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1937.987133] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:12:51 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1938.051560] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1938.076218] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:12:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1938.163222] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:12:51 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x6000000) 21:12:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xff01}) [ 1938.504011] Dev loop3: unable to read RDB block 1 [ 1938.504070] loop3: unable to read partition table [ 1938.504175] loop3: partition table beyond EOD, truncated [ 1938.504197] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:12:51 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:52 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1938.808909] Dev loop1: unable to read RDB block 1 [ 1938.809308] loop1: unable to read partition table [ 1938.809871] loop1: partition table beyond EOD, truncated [ 1938.809985] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:12:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000}) 21:12:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:12:52 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x7000000) [ 1938.958437] Dev loop3: unable to read RDB block 1 [ 1938.958853] loop3: unable to read partition table [ 1938.959216] loop3: partition table beyond EOD, truncated [ 1938.959296] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1939.014608] Dev loop3: unable to read RDB block 1 [ 1939.014633] loop3: unable to read partition table [ 1939.014697] loop3: partition table beyond EOD, truncated 21:12:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4000000}) [ 1939.093054] Dev loop4: unable to read RDB block 1 [ 1939.093151] loop4: unable to read partition table [ 1939.093435] loop4: partition table beyond EOD, truncated [ 1939.093489] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1939.243248] loop0: p1 < > p2 p3 < p5 p6 > p4 21:12:52 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:52 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1939.297866] Dev loop1: unable to read RDB block 1 [ 1939.314877] loop1: unable to read partition table [ 1939.317751] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1939.321807] loop1: partition table beyond EOD, truncated 21:12:52 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x8000000) [ 1939.366319] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1939.383099] Dev loop1: unable to read RDB block 1 [ 1939.383127] loop1: unable to read partition table [ 1939.383227] loop1: partition table beyond EOD, truncated [ 1939.444262] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1939.534257] Dev loop3: unable to read RDB block 1 [ 1939.539828] loop3: unable to read partition table [ 1939.550982] loop3: partition table beyond EOD, truncated [ 1939.551002] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1939.582359] Dev loop4: unable to read RDB block 1 [ 1939.582875] loop4: unable to read partition table [ 1939.583508] loop4: partition table beyond EOD, truncated [ 1939.583569] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:12:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e1948", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:52 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 21:12:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000000}) 21:12:52 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:52 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:53 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x9000000) 21:12:53 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1939.894475] Dev loop3: unable to read RDB block 1 [ 1939.894505] loop3: unable to read partition table [ 1939.894568] loop3: partition table beyond EOD, truncated [ 1939.894581] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1939.995479] Dev loop1: unable to read RDB block 1 [ 1939.995610] loop1: unable to read partition table [ 1939.996314] loop1: partition table beyond EOD, truncated [ 1939.996369] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1940.026894] Dev loop4: unable to read RDB block 1 [ 1940.027360] loop4: unable to read partition table [ 1940.028044] loop4: partition table beyond EOD, truncated 21:12:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000000}) [ 1940.028139] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:12:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:12:53 executing program 4: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 1940.217162] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1940.227388] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1940.248866] Dev loop3: unable to read RDB block 1 [ 1940.254640] loop3: unable to read partition table [ 1940.285795] loop3: partition table beyond EOD, truncated 21:12:53 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xb040000) 21:12:53 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1940.307342] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1940.326776] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1940.510449] Dev loop4: unable to read RDB block 1 [ 1940.513104] loop4: unable to read partition table [ 1940.513933] loop4: partition table beyond EOD, truncated [ 1940.514124] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1940.541697] Dev loop1: unable to read RDB block 1 [ 1940.541724] loop1: unable to read partition table [ 1940.541784] loop1: partition table beyond EOD, truncated [ 1940.554867] Dev loop1: unable to read RDB block 1 [ 1940.555280] loop1: unable to read partition table [ 1940.557345] loop1: partition table beyond EOD, truncated [ 1940.558067] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1940.791844] Dev loop3: unable to read RDB block 1 [ 1940.791874] loop3: unable to read partition table [ 1940.791940] loop3: partition table beyond EOD, truncated [ 1940.791956] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1940.843628] loop0: p1 < > p2 p3 < p5 p6 > p4 21:12:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e1948", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:12:54 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:12:54 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xc040000) 21:12:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000000}) [ 1940.845503] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1940.853580] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1941.105642] Dev loop1: unable to read RDB block 1 [ 1941.106090] loop1: unable to read partition table [ 1941.106682] loop1: partition table beyond EOD, truncated [ 1941.106778] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1941.150906] Dev loop3: unable to read RDB block 1 [ 1941.150935] loop3: unable to read partition table [ 1941.151002] loop3: partition table beyond EOD, truncated 21:12:54 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xd040000) [ 1941.151017] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1941.195826] Dev loop4: unable to read RDB block 1 21:12:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xff000000}) 21:12:54 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) [ 1941.234485] loop4: unable to read partition table [ 1941.234784] loop4: partition table beyond EOD, truncated [ 1941.234839] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:12:54 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1941.455824] loop0: p1 < > p2 p3 < p5 p6 > p4 21:12:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 1941.536828] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1941.631837] Dev loop3: unable to read RDB block 1 [ 1941.631867] loop3: unable to read partition table [ 1941.631931] loop3: partition table beyond EOD, truncated [ 1941.631946] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:12:55 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1941.648110] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1941.686118] Dev loop1: unable to read RDB block 1 [ 1941.687186] loop1: unable to read partition table [ 1941.689748] loop1: partition table beyond EOD, truncated 21:12:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e1948", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:55 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 21:12:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xff010000}) [ 1941.690168] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1941.799236] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1941.807929] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1941.837447] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:12:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xe040000) 21:12:55 executing program 4: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 21:12:55 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1942.111811] Dev loop3: unable to read RDB block 1 [ 1942.111842] loop3: unable to read partition table [ 1942.111906] loop3: partition table beyond EOD, truncated [ 1942.111921] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1942.244547] Dev loop1: unable to read RDB block 1 [ 1942.283081] loop1: unable to read partition table 21:12:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1942.308622] loop1: partition table beyond EOD, truncated [ 1942.317726] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:12:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xf040000) [ 1942.373827] Dev loop1: unable to read RDB block 1 [ 1942.378857] loop1: unable to read partition table [ 1942.382945] Dev loop4: unable to read RDB block 1 [ 1942.390914] loop4: unable to read partition table [ 1942.403619] loop4: partition table beyond EOD, truncated [ 1942.407068] loop1: partition table beyond EOD, truncated [ 1942.420121] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1942.424411] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1942.445217] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1942.466028] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1942.480622] Dev loop3: unable to read RDB block 1 [ 1942.480651] loop3: unable to read partition table [ 1942.480718] loop3: partition table beyond EOD, truncated 21:12:55 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1942.480734] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:12:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x10000000) 21:12:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 21:12:56 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 21:12:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad044", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:56 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}) [ 1942.892703] Dev loop3: unable to read RDB block 1 [ 1942.892731] loop3: unable to read partition table [ 1942.892796] loop3: partition table beyond EOD, truncated [ 1942.892813] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1943.082582] Dev loop1: unable to read RDB block 1 [ 1943.088134] loop1: unable to read partition table 21:12:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 1943.132899] loop1: partition table beyond EOD, truncated [ 1943.143122] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:12:56 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x10040000) [ 1943.205985] Dev loop1: unable to read RDB block 1 [ 1943.206015] loop1: unable to read partition table [ 1943.206072] loop1: partition table beyond EOD, truncated [ 1943.242588] Dev loop3: unable to read RDB block 1 [ 1943.242719] loop3: unable to read partition table [ 1943.243019] loop3: partition table beyond EOD, truncated [ 1943.243075] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:12:56 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e1948", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10}) [ 1943.377984] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1943.409683] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1943.513117] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:12:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1943.604265] Dev loop3: unable to read RDB block 1 [ 1943.621559] loop3: unable to read partition table 21:12:56 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x11040000) [ 1943.662496] loop3: partition table beyond EOD, truncated 21:12:57 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad044", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1943.690047] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1943.718507] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1943.720269] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1943.729984] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1943.808744] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1943.866133] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1943.996911] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:12:57 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x12040000) 21:12:57 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1944.098378] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1944.134574] Dev loop3: unable to read RDB block 1 21:12:57 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x13040000) [ 1944.135306] loop3: unable to read partition table [ 1944.135892] loop3: partition table beyond EOD, truncated [ 1944.136346] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1944.246844] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1944.497041] Dev loop3: unable to read RDB block 1 [ 1944.497306] loop3: unable to read partition table [ 1944.498129] loop3: partition table beyond EOD, truncated 21:12:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e1948", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:57 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2000}) [ 1944.498337] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1944.517593] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1944.620978] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1944.655460] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1944.672600] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1944.682366] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1944.706534] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:12:57 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x14040000) 21:12:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1944.807939] Dev loop3: unable to read RDB block 1 [ 1944.808622] loop3: unable to read partition table [ 1944.809258] loop3: partition table beyond EOD, truncated [ 1944.809516] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1944.867604] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:12:58 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad044", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:58 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x15040000) [ 1944.985781] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1944.997892] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:12:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4000}) [ 1945.285989] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1945.313741] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1945.417038] Dev loop3: unable to read RDB block 1 [ 1945.460919] loop3: unable to read partition table [ 1945.472998] loop4: p2 size 1073741824 extends beyond EOD, [ 1945.473003] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1945.473031] truncated [ 1945.495894] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1945.541710] loop3: partition table beyond EOD, truncated 21:12:58 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x16040000) [ 1945.582305] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1945.592248] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:12:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e1948", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1945.660518] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1945.697336] loop0: p1 < > p2 p3 < p5 p6 > p4 21:12:59 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:12:59 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1badface) [ 1945.739223] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:12:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449d", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:12:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff00}) [ 1946.035854] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1946.127406] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1946.164121] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1946.192136] Dev loop3: unable to read RDB block 1 [ 1946.198811] loop3: unable to read partition table [ 1946.226134] loop3: partition table beyond EOD, truncated [ 1946.244917] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:12:59 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1f000000) 21:12:59 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1946.365781] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1946.400434] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1946.489216] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1946.689331] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:00 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x20000000) [ 1946.691991] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1946.695371] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1946.785585] Dev loop3: unable to read RDB block 1 21:13:00 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1946.785701] loop3: unable to read partition table [ 1946.785780] loop3: partition table beyond EOD, truncated [ 1946.785796] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1946.844754] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:00 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1946.941247] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:00 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x22000000) [ 1946.962892] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:00 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:13:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff01}) 21:13:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449d", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1947.092536] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1947.261826] Dev loop3: unable to read RDB block 1 [ 1947.266895] loop3: unable to read partition table [ 1947.273621] loop3: partition table beyond EOD, truncated [ 1947.279144] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1947.307671] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:00 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 1947.316577] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1947.322824] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1947.332645] Dev loop1: unable to read RDB block 1 [ 1947.332741] loop1: unable to read partition table [ 1947.333027] loop1: partition table beyond EOD, truncated [ 1947.333098] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:13:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000}) 21:13:00 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1947.543077] Dev loop4: unable to read RDB block 1 [ 1947.548433] loop4: unable to read partition table [ 1947.557376] loop4: partition table beyond EOD, truncated [ 1947.566103] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1947.623399] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1947.641073] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1947.718378] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:01 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x23000000) 21:13:01 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:01 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1947.821652] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:01 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1947.822978] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1947.827927] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4000000}) [ 1947.854755] Dev loop1: unable to read RDB block 1 [ 1947.855187] loop1: unable to read partition table [ 1947.855933] loop1: partition table beyond EOD, truncated [ 1947.856085] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1948.174633] Dev loop4: unable to read RDB block 1 [ 1948.174743] loop4: unable to read partition table [ 1948.175014] loop4: partition table beyond EOD, truncated [ 1948.175120] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:13:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000000}) 21:13:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449d", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:01 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x2c000000) [ 1948.372434] Dev loop1: unable to read RDB block 1 [ 1948.377592] loop1: unable to read partition table [ 1948.384395] loop1: partition table beyond EOD, truncated [ 1948.392301] Dev loop1: unable to read RDB block 1 [ 1948.397707] loop1: unable to read partition table [ 1948.405647] loop1: partition table beyond EOD, truncated [ 1948.412565] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:13:01 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:01 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449d", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1948.604599] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1948.696594] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:02 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x3f000000) 21:13:02 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 1948.792300] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000}) 21:13:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449d", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000}) 21:13:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1949.290983] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1949.297558] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1949.307778] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:02 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 1949.402920] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1949.415594] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1949.452491] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1949.493668] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1949.609921] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:02 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x40000000) 21:13:02 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 21:13:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff000000}) [ 1949.727479] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1949.910767] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1949.921168] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1949.934607] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:03 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 21:13:03 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x48000000) [ 1949.955746] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449d", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1949.957569] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1949.961849] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449d", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff010000}) [ 1950.450713] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1950.475614] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1950.489064] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:03 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x4c000000) 21:13:03 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:13:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:04 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1950.587205] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:04 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x68000000) [ 1950.684814] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1950.703770] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1950.714226] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1950.748773] Dev loop3: unable to read RDB block 1 [ 1950.749190] loop3: unable to read partition table [ 1950.749867] loop3: partition table beyond EOD, truncated [ 1950.752731] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1950.838142] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1950.956233] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1950.957732] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1950.971331] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1950.977187] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1950.990233] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1951.061515] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1951.088152] Dev loop3: unable to read RDB block 1 21:13:04 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1951.101951] loop3: unable to read partition table 21:13:04 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1951.104151] loop3: partition table beyond EOD, truncated [ 1951.104214] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1951.132578] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad044", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1951.501684] Dev loop3: unable to read RDB block 1 [ 1951.508341] loop3: unable to read partition table 21:13:04 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x6b6b6b00) 21:13:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}) 21:13:04 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0}]) [ 1951.522313] loop3: partition table beyond EOD, truncated [ 1951.522384] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1951.581785] Dev loop4: unable to read RDB block 1 [ 1951.581859] loop4: unable to read partition table [ 1951.581978] loop4: partition table beyond EOD, truncated [ 1951.582001] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1951.819196] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1951.826615] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:05 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1951.847914] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1951.862855] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1951.899023] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1951.988024] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:05 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0}]) 21:13:05 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x6c000000) 21:13:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1952.056153] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1952.059331] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1952.085516] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}) [ 1952.333064] Dev loop4: unable to read RDB block 1 [ 1952.334001] loop4: unable to read partition table [ 1952.334585] loop4: partition table beyond EOD, truncated [ 1952.334935] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:13:05 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0}]) 21:13:05 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:13:05 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 21:13:05 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x74000000) 21:13:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2000}) [ 1952.617844] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1952.624756] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1952.650387] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1952.771420] Dev loop4: unable to read RDB block 1 [ 1952.777102] loop4: unable to read partition table [ 1952.785417] loop4: partition table beyond EOD, truncated [ 1952.792030] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:13:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:06 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x76e2798a) 21:13:06 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) [ 1952.943058] Dev loop1: unable to read RDB block 1 [ 1952.943305] loop1: unable to read partition table [ 1952.943719] loop1: partition table beyond EOD, truncated [ 1952.944076] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:13:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}) [ 1953.211000] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1953.212802] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1953.229146] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1953.288216] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1953.328513] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1953.385426] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:06 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x7a000000) [ 1953.492924] Dev loop1: unable to read RDB block 1 [ 1953.508617] loop1: unable to read partition table [ 1953.518959] loop1: partition table beyond EOD, truncated [ 1953.531126] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:13:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:07 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 21:13:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:07 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x8a79e276) [ 1953.970684] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff00}) [ 1953.972322] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1953.976567] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1954.219589] Dev loop1: unable to read RDB block 1 [ 1954.236154] loop1: unable to read partition table [ 1954.252236] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 1954.277998] loop1: partition table beyond EOD, truncated 21:13:07 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x8cffffff) 21:13:07 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 1954.318600] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1954.326187] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:07 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 1954.406204] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1954.501263] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1954.505713] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1954.509420] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1954.558085] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:08 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x97ffffff) [ 1954.560544] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1954.570228] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1954.773394] Dev loop1: unable to read RDB block 1 [ 1954.775299] loop1: unable to read partition table [ 1954.777345] loop1: partition table beyond EOD, truncated 21:13:08 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 1954.777629] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1954.825212] Dev loop3: unable to read RDB block 1 [ 1954.825241] loop3: unable to read partition table [ 1954.825306] loop3: partition table beyond EOD, truncated [ 1954.825320] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1954.962920] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:08 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:13:08 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xc0ed0000) [ 1954.987755] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1954.992187] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1955.093875] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1955.095149] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff01}) 21:13:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1955.097857] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1955.190480] Dev loop3: unable to read RDB block 1 [ 1955.190635] loop3: unable to read partition table [ 1955.190939] loop3: partition table beyond EOD, truncated [ 1955.190953] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:08 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1955.414678] Dev loop1: unable to read RDB block 1 [ 1955.428932] loop1: unable to read partition table [ 1955.446412] loop1: partition table beyond EOD, truncated [ 1955.451210] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1955.464514] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 21:13:08 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xc8260000) 21:13:09 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:13:09 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 1955.512053] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1955.637858] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1955.706513] Dev loop3: unable to read RDB block 1 [ 1955.706901] loop3: unable to read partition table 21:13:09 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xc9260000) [ 1955.707635] loop3: partition table beyond EOD, truncated [ 1955.707691] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1955.862877] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1955.898707] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f050000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1956.148654] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:09 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1956.183569] Dev loop1: unable to read RDB block 1 [ 1956.183683] loop1: unable to read partition table [ 1956.184019] loop1: partition table beyond EOD, truncated [ 1956.184073] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1956.287083] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:09 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xcefaad1b) [ 1956.288613] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1956.294670] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1956.480991] loop3: p1 < > p2 p3 < p5 p6 > p4 21:13:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}) [ 1956.514560] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1956.600436] Dev loop1: unable to read RDB block 1 [ 1956.630784] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1956.637028] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:10 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:13:10 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xf5ffffff) 21:13:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:10 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 1956.656762] loop1: unable to read partition table [ 1956.657034] loop1: partition table beyond EOD, truncated [ 1956.657186] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1956.665083] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1956.722999] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1956.866845] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1957.009807] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}) [ 1957.227392] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1957.245046] Dev loop1: unable to read RDB block 1 [ 1957.310343] loop1: unable to read partition table [ 1957.317475] loop1: partition table beyond EOD, truncated [ 1957.323833] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1957.370401] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1957.385074] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1957.403758] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:10 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:10 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xf6ffffff) 21:13:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000000}) 21:13:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f050000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1957.656717] Dev loop3: unable to read RDB block 1 [ 1957.656746] loop3: unable to read partition table [ 1957.656815] loop3: partition table beyond EOD, truncated [ 1957.656831] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:11 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfa030000) [ 1957.850502] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1957.860764] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1957.891737] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:11 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfbffffff) [ 1958.127205] loop3: p1 < > p2 p3 < p5 p6 > p4 21:13:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1958.137493] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1958.198655] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1958.230276] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1958.240787] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1958.289790] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1958.290239] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1958.421658] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}) [ 1958.503940] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1958.873409] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1958.934707] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:12 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:12 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfcfdffff) 21:13:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1959.014658] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1959.234433] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:12 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfdfdffff) [ 1959.308754] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1959.324456] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1959.456192] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1959.516226] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1959.596173] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1959.596459] loop1: partition table partially beyond EOD, truncated [ 1959.619099] loop1: p1 start 1 is beyond EOD, truncated 21:13:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000000}) [ 1959.619128] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1959.726489] loop1: p3 size 2 extends beyond EOD, truncated [ 1959.810986] loop1: p4 size 32768 extends beyond EOD, truncated [ 1959.820757] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1959.847919] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1959.849216] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1959.862797] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1959.865403] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1959.908314] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1959.940592] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1959.946841] loop1: p6 size 32768 extends beyond EOD, truncated 21:13:13 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfdffffff) 21:13:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1960.112031] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:13 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xff0f0000) 21:13:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:14 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffff1f00) 21:13:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:14 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfffffdfc) [ 1960.476847] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1960.521329] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1960.523528] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1960.536147] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1960.563142] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1960.702115] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1960.734887] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1960.791736] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1960.815116] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1960.816503] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1960.820032] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1960.946449] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1960.982936] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1961.008441] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1961.286979] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1961.617018] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1961.668371] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1961.701249] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1961.809880] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1961.836430] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff000000}) 21:13:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:15 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfffffdfd) [ 1961.910376] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1961.985382] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:15 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffffff7f) 21:13:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1962.026457] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1962.153469] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1962.155321] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1962.161584] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1962.199568] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1962.402856] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1962.503017] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1962.594340] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1962.624741] loop3: p5 size 1073741824 extends beyond EOD, truncated 21:13:15 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffffff8c) 21:13:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:16 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffffff97) [ 1962.750432] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1962.753391] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1962.758325] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1962.775935] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1962.777788] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1962.795983] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1962.798110] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1962.904772] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1962.957493] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1962.992727] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1963.191623] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1963.430323] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1963.480813] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1963.503925] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1963.505513] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1963.509107] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1963.605463] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1963.607194] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1963.630941] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1963.656390] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1963.823830] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff010000}) 21:13:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:17 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfffffff5) 21:13:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1963.935095] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:17 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfffffff6) 21:13:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1964.172478] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1964.230839] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1964.232500] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1964.236828] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1964.280878] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1964.291656] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1964.318507] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:17 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfffffffb) [ 1964.351080] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1964.435056] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1964.585628] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1964.914083] loop3: p1 < > p2 p3 < p5 p6 > p4 21:13:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1965.032917] loop3: p2 size 1073741824 extends beyond EOD, truncated 21:13:18 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfffffffd) [ 1965.146086] loop3: p5 size 1073741824 extends beyond EOD, truncated 21:13:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 1965.241839] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1965.346592] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1965.446329] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1965.467204] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:18 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x800000000) 21:13:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1965.610645] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 1965.778528] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1965.866637] loop3: p1 < > p2 p3 < p5 p6 > p4 21:13:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1965.918915] loop3: p2 size 1073741824 extends beyond EOD, truncated 21:13:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x4]}) 21:13:19 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1000000000) 21:13:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 21:13:19 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xedc000000000) [ 1966.187362] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1966.400679] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1966.492212] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 1966.530886] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1966.615257] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1966.697839] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 21:13:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x10]}) [ 1966.853205] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:20 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1000000000000) 21:13:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1967.285910] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1967.298414] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1967.397795] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1967.411140] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:13:20 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x2000000000000) [ 1967.452047] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1967.630771] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1967.652317] Dev loop0: unable to read RDB block 1 [ 1967.652527] loop0: unable to read partition table [ 1967.652818] loop0: partition table beyond EOD, truncated 21:13:21 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x4000000000000) 21:13:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1967.652857] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x2000]}) 21:13:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1968.179887] Dev loop0: unable to read RDB block 1 [ 1968.185895] loop0: unable to read partition table [ 1968.214359] loop0: partition table beyond EOD, truncated [ 1968.214445] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1968.373519] Dev loop3: unable to read RDB block 1 21:13:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 21:13:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x4000]}) [ 1968.381138] loop3: unable to read partition table [ 1968.388057] loop3: partition table beyond EOD, truncated [ 1968.406613] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1968.424926] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:21 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x7ffffffffffff) [ 1968.493750] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 1968.562310] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1968.600261] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1968.602349] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 1968.608177] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1968.666449] Dev loop0: unable to read RDB block 1 21:13:22 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xe000000000000) 21:13:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1968.666613] loop0: unable to read partition table [ 1968.666915] loop0: partition table beyond EOD, truncated [ 1968.666989] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1968.940102] Dev loop3: unable to read RDB block 1 21:13:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0xff00]}) [ 1968.945957] loop3: unable to read partition table [ 1968.946217] loop3: partition table beyond EOD, truncated [ 1968.946410] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1969.189750] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 21:13:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:22 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x40000000000000) [ 1969.202342] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1969.208803] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1969.236901] Dev loop0: unable to read RDB block 1 [ 1969.236926] loop0: unable to read partition table [ 1969.236974] loop0: partition table beyond EOD, truncated [ 1969.248696] Dev loop0: unable to read RDB block 1 [ 1969.249930] loop0: unable to read partition table 21:13:22 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x6b6b6b00000000) [ 1969.250880] loop0: partition table beyond EOD, truncated [ 1969.250946] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1969.455437] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1969.541422] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1969.542259] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1969.627285] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1969.751587] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1969.764020] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1969.779476] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1969.782079] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1969.816041] Dev loop0: unable to read RDB block 1 [ 1969.825815] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1969.845661] loop0: unable to read partition table [ 1969.889523] loop0: partition table beyond EOD, truncated [ 1969.895795] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1969.906804] Dev loop0: unable to read RDB block 1 [ 1969.916790] loop0: unable to read partition table 21:13:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 21:13:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:23 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x100000000000000) 21:13:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0xff01]}) [ 1970.020215] loop0: partition table beyond EOD, truncated [ 1970.361956] Dev loop0: unable to read RDB block 1 [ 1970.367374] loop0: unable to read partition table [ 1970.380343] loop0: partition table beyond EOD, truncated [ 1970.386489] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1970.394577] Dev loop0: unable to read RDB block 1 [ 1970.400083] loop0: unable to read partition table [ 1970.405375] loop0: partition table beyond EOD, truncated [ 1970.495388] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1970.530620] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1970.606476] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1970.640595] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1970.678355] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 21:13:23 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x200000000000000) [ 1970.727969] loop3: p1 < > p2 p3 < p5 p6 > p4 21:13:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 21:13:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1970.800249] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1970.822705] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1971.041099] Dev loop0: unable to read RDB block 1 [ 1971.041314] loop0: unable to read partition table [ 1971.041773] loop0: partition table beyond EOD, truncated [ 1971.041853] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1971.054218] Dev loop0: unable to read RDB block 1 [ 1971.054245] loop0: unable to read partition table [ 1971.054298] loop0: partition table beyond EOD, truncated [ 1971.076319] loop3: p5 size 1073741824 extends beyond EOD, truncated 21:13:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x40000]}) 21:13:24 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x300000000000000) 21:13:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 21:13:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) [ 1971.386223] Dev loop0: unable to read RDB block 1 [ 1971.386488] loop0: unable to read partition table [ 1971.386743] loop0: partition table beyond EOD, truncated [ 1971.386811] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1971.580512] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1971.605743] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1971.651372] Dev loop3: unable to read RDB block 1 [ 1971.651399] loop3: unable to read partition table 21:13:24 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x400000000000000) [ 1971.651557] loop3: partition table beyond EOD, truncated [ 1971.665027] Dev loop3: unable to read RDB block 1 [ 1971.715014] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1971.720025] loop3: unable to read partition table [ 1971.732610] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1971.736966] loop3: partition table beyond EOD, truncated [ 1971.744287] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 21:13:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) 21:13:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1971.781393] Dev loop0: unable to read RDB block 1 [ 1971.781587] Dev loop3: unable to read RDB block 1 [ 1971.781606] loop3: unable to read partition table 21:13:25 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x500000000000000) [ 1971.781646] loop3: partition table beyond EOD, truncated [ 1971.782872] loop0: unable to read partition table [ 1971.783067] loop0: partition table beyond EOD, truncated [ 1971.783133] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1971.801534] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 21:13:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x4000000]}) [ 1971.911610] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1972.145481] Dev loop0: unable to read RDB block 1 [ 1972.145885] loop0: unable to read partition table [ 1972.146749] loop0: partition table beyond EOD, truncated [ 1972.146900] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1972.451687] Dev loop3: unable to read RDB block 1 [ 1972.457073] loop3: unable to read partition table 21:13:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1972.496755] loop3: partition table beyond EOD, truncated [ 1972.497536] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1972.531001] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1972.542639] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1972.664578] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1972.685795] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1972.731041] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1972.833080] Dev loop0: unable to read RDB block 1 21:13:26 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x600000000000000) 21:13:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) 21:13:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1972.947939] loop0: unable to read partition table [ 1972.951389] loop0: partition table beyond EOD, truncated [ 1972.951630] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:26 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x700000000000000) [ 1972.970662] loop3: p1 < > p2 p3 < p5 p6 > p4 21:13:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x10000000]}) [ 1972.972194] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1972.982429] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1973.057369] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1973.288554] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1973.341639] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1973.384214] Dev loop0: unable to read RDB block 1 [ 1973.390685] loop0: unable to read partition table [ 1973.397338] loop0: partition table beyond EOD, truncated [ 1973.405515] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 21:13:26 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x900000000000000) 21:13:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1973.574982] loop3: p5 size 1073741824 extends beyond EOD, truncated 21:13:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 1973.857196] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1973.873312] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1973.914669] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1973.938156] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1973.974713] Dev loop0: unable to read RDB block 1 [ 1973.974927] loop0: unable to read partition table [ 1973.975262] loop0: partition table beyond EOD, truncated 21:13:27 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xb04000000000000) 21:13:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x20000000]}) 21:13:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1973.975351] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1974.030999] Dev loop0: unable to read RDB block 1 [ 1974.031031] loop0: unable to read partition table [ 1974.031091] loop0: partition table beyond EOD, truncated [ 1974.050668] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1974.347053] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1974.460099] Dev loop0: unable to read RDB block 1 [ 1974.460123] loop0: unable to read partition table [ 1974.460172] loop0: partition table beyond EOD, truncated [ 1974.462608] Dev loop0: unable to read RDB block 1 [ 1974.462722] loop0: unable to read partition table [ 1974.462974] loop0: partition table beyond EOD, truncated [ 1974.463059] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1974.574588] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1974.583156] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1974.614646] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) 21:13:28 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xc04000000000000) [ 1974.625774] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1974.640561] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1974.720293] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x40000000]}) 21:13:28 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xd04000000000000) 21:13:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 1975.352710] Dev loop0: unable to read RDB block 1 [ 1975.352822] loop0: unable to read partition table [ 1975.353144] loop0: partition table beyond EOD, truncated [ 1975.353248] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:13:28 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xe04000000000000) 21:13:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1975.445009] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1975.446846] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1975.452692] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1975.493653] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1975.504219] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1975.599685] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1975.716685] Dev loop3: unable to read RDB block 1 [ 1975.716745] loop3: unable to read partition table [ 1975.716987] loop3: partition table beyond EOD, truncated [ 1975.717008] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1975.747720] Dev loop0: unable to read RDB block 1 [ 1975.748017] loop0: unable to read partition table [ 1975.748678] loop0: partition table beyond EOD, truncated 21:13:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0xff000000]}) [ 1975.748746] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1975.850320] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1975.864573] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:13:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1975.967311] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:29 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xf04000000000000) 21:13:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1976.107970] Dev loop0: unable to read RDB block 1 [ 1976.109298] loop0: unable to read partition table [ 1976.110841] loop0: partition table beyond EOD, truncated [ 1976.112167] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1976.312720] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1976.327192] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1976.403920] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1976.428667] loop3: p2 size 1073741824 extends beyond EOD, truncated 21:13:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1976.465240] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:29 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1004000000000000) 21:13:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:30 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1104000000000000) [ 1976.670485] Dev loop0: unable to read RDB block 1 [ 1976.671594] loop0: unable to read partition table [ 1976.673018] loop0: partition table beyond EOD, truncated [ 1976.673170] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1976.713244] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1977.035517] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 1977.046379] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1977.083640] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1977.145160] Dev loop0: unable to read RDB block 1 [ 1977.145847] loop0: unable to read partition table [ 1977.146561] loop0: partition table beyond EOD, truncated [ 1977.146641] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0xff010000]}) 21:13:30 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1204000000000000) 21:13:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1977.550487] Dev loop3: unable to read RDB block 1 [ 1977.550519] loop3: unable to read partition table [ 1977.550582] loop3: partition table beyond EOD, truncated [ 1977.594253] Dev loop3: unable to read RDB block 1 [ 1977.594639] loop3: unable to read partition table [ 1977.595692] loop3: partition table beyond EOD, truncated [ 1977.595850] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1977.707515] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) 21:13:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:31 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1304000000000000) 21:13:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1977.746211] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1977.756675] Dev loop0: unable to read RDB block 1 [ 1977.756703] loop0: unable to read partition table [ 1977.756760] loop0: partition table beyond EOD, truncated [ 1977.775522] Dev loop0: unable to read RDB block 1 [ 1977.775551] loop0: unable to read partition table [ 1977.778135] loop0: partition table beyond EOD, truncated [ 1977.778315] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1977.858079] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1978.155630] Dev loop3: unable to read RDB block 1 [ 1978.167409] loop3: unable to read partition table [ 1978.177241] loop3: partition table beyond EOD, truncated [ 1978.187982] Dev loop3: unable to read RDB block 1 [ 1978.192182] Dev loop0: unable to read RDB block 1 [ 1978.196113] loop3: unable to read partition table [ 1978.198088] loop0: unable to read partition table [ 1978.212673] loop0: partition table beyond EOD, truncated [ 1978.230976] loop3: partition table beyond EOD, truncated [ 1978.231570] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1978.263906] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:31 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1404000000000000) [ 1978.305235] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 1978.333099] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1978.438983] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1978.583937] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1978.713562] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1978.830958] Dev loop0: unable to read RDB block 1 [ 1978.832197] loop0: unable to read partition table [ 1978.835118] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1978.844276] loop0: partition table beyond EOD, truncated 21:13:32 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1504000000000000) [ 1978.844379] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1978.906060] Dev loop3: unable to read RDB block 1 [ 1978.906091] loop3: unable to read partition table [ 1978.906156] loop3: partition table beyond EOD, truncated [ 1978.906173] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1978.943376] Dev loop0: unable to read RDB block 1 21:13:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x4]}) 21:13:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1978.943410] loop0: unable to read partition table [ 1978.943472] loop0: partition table beyond EOD, truncated 21:13:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 21:13:32 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1604000000000000) [ 1979.375900] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1979.402498] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 1979.499565] Dev loop0: unable to read RDB block 1 21:13:33 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x1f00000000000000) [ 1979.499834] loop0: unable to read partition table [ 1979.500675] loop0: partition table beyond EOD, truncated [ 1979.500748] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1979.513049] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1979.540432] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1979.554003] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1979.562466] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1979.566400] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1979.900806] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1979.949998] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x10]}) [ 1980.209679] Dev loop0: unable to read RDB block 1 [ 1980.209711] loop0: unable to read partition table [ 1980.209766] loop0: partition table beyond EOD, truncated [ 1980.214856] Dev loop0: unable to read RDB block 1 [ 1980.214953] loop0: unable to read partition table [ 1980.215254] loop0: partition table beyond EOD, truncated [ 1980.215349] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 21:13:33 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x2000000000000000) [ 1980.495556] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1980.587696] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1980.636055] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1980.677727] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1980.861493] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1980.874156] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1980.896806] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1980.943715] loop3: p2 size 1073741824 extends beyond EOD, truncated 21:13:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 21:13:34 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x2200000000000000) 21:13:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1981.145816] loop3: p5 size 1073741824 extends beyond EOD, truncated 21:13:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 1981.287280] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1981.289747] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1981.295675] loop3: p5 size 1073741824 extends beyond EOD, truncated 21:13:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x2000]}) 21:13:34 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x2300000000000000) 21:13:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 21:13:35 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x2c00000000000000) [ 1981.590684] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) [ 1981.610446] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1981.634023] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1981.734707] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1981.831014] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1981.843930] Dev loop3: unable to read RDB block 1 [ 1981.844278] loop3: unable to read partition table [ 1981.844760] loop3: partition table beyond EOD, truncated [ 1981.844855] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1981.963275] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x4000]}) 21:13:35 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x3f00000000000000) 21:13:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 21:13:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:35 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x4000000000000000) 21:13:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0xff00]}) [ 1982.673040] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1982.743081] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1982.912004] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1982.925712] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1982.955750] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1983.034656] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 21:13:36 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x4800000000000000) [ 1983.170913] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 1983.210978] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1983.349079] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:36 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x4c00000000000000) [ 1983.433900] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1983.434784] Dev loop3: unable to read RDB block 1 [ 1983.434982] loop3: unable to read partition table [ 1983.435484] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1983.436927] loop3: partition table beyond EOD, truncated [ 1983.437158] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1983.455779] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1983.750939] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1983.775704] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1983.857498] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 21:13:37 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x6800000000000000) 21:13:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1983.889665] Dev loop3: unable to read RDB block 1 [ 1983.889795] loop3: unable to read partition table [ 1983.890133] loop3: partition table beyond EOD, truncated [ 1983.890406] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1983.921309] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1984.142893] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:37 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x6c00000000000000) [ 1984.351580] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1984.469336] Dev loop3: unable to read RDB block 1 [ 1984.474703] loop3: unable to read partition table [ 1984.495457] loop3: partition table beyond EOD, truncated 21:13:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0xff01]}) 21:13:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1984.504905] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1984.573327] Dev loop3: unable to read RDB block 1 [ 1984.587161] loop3: unable to read partition table 21:13:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:38 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x7400000000000000) [ 1984.607862] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1984.610080] loop3: partition table beyond EOD, truncated [ 1984.744339] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1984.844279] Dev loop3: unable to read RDB block 1 [ 1984.844393] loop3: unable to read partition table [ 1984.844839] loop3: partition table beyond EOD, truncated [ 1984.844885] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1984.878942] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1984.999708] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1985.030184] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:38 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x76e2798a00000000) [ 1985.100032] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1985.101285] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1985.105110] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1985.115060] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x40000000002, 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1985.127127] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1985.186613] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1985.303933] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1985.366411] Dev loop3: unable to read RDB block 1 [ 1985.366591] loop3: unable to read partition table [ 1985.367473] loop3: partition table beyond EOD, truncated 21:13:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x40000]}) [ 1985.367682] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1985.721272] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1985.769755] Dev loop3: unable to read RDB block 1 [ 1985.776251] loop3: unable to read partition table 21:13:39 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x7a00000000000000) [ 1985.809846] loop3: partition table beyond EOD, truncated [ 1985.813535] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:39 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x7fffffffffffffff) 21:13:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1985.839363] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1985.878167] Dev loop3: unable to read RDB block 1 [ 1985.878233] loop3: unable to read partition table [ 1985.878303] loop3: partition table beyond EOD, truncated [ 1986.035787] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1986.080831] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1986.153932] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1986.161220] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1986.173372] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1986.183036] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1986.191906] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1986.196472] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1986.202777] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1986.429759] Dev loop3: unable to read RDB block 1 21:13:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x40000000002, 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x4000000]}) [ 1986.511932] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1986.535273] loop3: unable to read partition table [ 1986.535348] loop3: partition table beyond EOD, truncated [ 1986.535365] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:40 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x8000000000000000) [ 1986.832825] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1986.841948] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1986.863123] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1986.959208] Dev loop3: unable to read RDB block 1 [ 1986.964451] loop3: unable to read partition table [ 1986.992426] loop3: partition table beyond EOD, truncated [ 1987.025001] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1987.048237] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:40 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x8cffffff00000000) [ 1987.100045] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1987.163631] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1987.227773] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1987.279598] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1987.419338] Dev loop3: unable to read RDB block 1 [ 1987.419368] loop3: unable to read partition table [ 1987.419436] loop3: partition table beyond EOD, truncated 21:13:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x40000000002, 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1987.419451] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1987.485227] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x40000000002, 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:40 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x97ffffff00000000) 21:13:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1987.671509] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1987.674316] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1987.692031] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1987.882299] Dev loop3: unable to read RDB block 1 [ 1987.882431] loop3: unable to read partition table 21:13:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x10000000]}) [ 1987.882751] loop3: partition table beyond EOD, truncated [ 1987.882805] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:41 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xc826000000000000) [ 1988.089046] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1988.136209] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x40000000002, 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1988.176000] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1988.237083] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1988.289622] Dev loop3: unable to read RDB block 1 [ 1988.291413] loop3: unable to read partition table 21:13:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1988.294199] loop3: partition table beyond EOD, truncated [ 1988.294628] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1988.361820] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1988.413975] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1988.471801] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:42 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xc926000000000000) [ 1988.473441] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1988.499936] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1988.773679] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1988.776845] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1988.876168] Dev loop3: unable to read RDB block 1 [ 1988.876934] loop3: unable to read partition table 21:13:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1988.877556] loop3: partition table beyond EOD, truncated 21:13:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1988.879029] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1988.913268] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1989.139479] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:42 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xcefaad1b00000000) 21:13:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1989.167565] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1989.253975] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1989.261714] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1989.361020] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1989.364767] Dev loop3: unable to read RDB block 1 [ 1989.365286] loop3: unable to read partition table [ 1989.366266] loop3: partition table beyond EOD, truncated [ 1989.366351] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x20000000]}) 21:13:43 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xf5ffffff00000000) [ 1989.367457] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1989.369730] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1989.376874] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1989.609648] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1989.633866] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1989.752528] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1989.875360] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1989.982646] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1989.994788] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1990.011716] Dev loop3: unable to read RDB block 1 [ 1990.011831] loop3: unable to read partition table [ 1990.012182] loop3: partition table beyond EOD, truncated [ 1990.012237] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1990.025714] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:43 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xf6ffffff00000000) 21:13:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1990.269807] Dev loop0: unable to read RDB block 1 [ 1990.270275] loop0: unable to read partition table [ 1990.271002] loop0: partition table beyond EOD, truncated [ 1990.271070] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1990.318983] Dev loop0: unable to read RDB block 1 [ 1990.319010] loop0: unable to read partition table [ 1990.319065] loop0: partition table beyond EOD, truncated [ 1990.503773] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1990.558052] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1990.576454] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1990.626831] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1990.648010] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x40000000]}) [ 1990.738429] Dev loop3: unable to read RDB block 1 [ 1990.746072] loop3: unable to read partition table [ 1990.782542] Dev loop0: unable to read RDB block 1 [ 1990.785103] loop3: partition table beyond EOD, truncated [ 1990.791263] loop0: unable to read partition table [ 1990.812888] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:44 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfa03000000000000) [ 1990.834429] loop0: partition table beyond EOD, truncated 21:13:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1990.853939] Dev loop3: unable to read RDB block 1 21:13:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0xff000000]}) [ 1990.854758] loop3: unable to read partition table [ 1990.858113] loop3: partition table beyond EOD, truncated [ 1990.858388] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1990.878579] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:44 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:44 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfbffffff00000000) 21:13:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1991.313575] Dev loop3: unable to read RDB block 1 [ 1991.313790] loop3: unable to read partition table [ 1991.314159] loop3: partition table beyond EOD, truncated [ 1991.314267] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1991.353400] Dev loop0: unable to read RDB block 1 [ 1991.353495] loop0: unable to read partition table [ 1991.354013] loop0: partition table beyond EOD, truncated [ 1991.354070] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1991.581784] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1991.605600] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1991.647749] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1991.686328] Dev loop3: unable to read RDB block 1 [ 1991.687419] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0xff010000]}) [ 1991.702900] loop3: unable to read partition table [ 1991.716855] loop3: partition table beyond EOD, truncated [ 1991.745851] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:45 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfcfdffff00000000) [ 1991.770329] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1991.781135] Dev loop3: unable to read RDB block 1 [ 1991.786312] loop3: unable to read partition table [ 1991.798553] loop3: partition table beyond EOD, truncated 21:13:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1991.862989] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1991.868934] Dev loop0: unable to read RDB block 1 [ 1991.869511] loop0: unable to read partition table [ 1991.870419] loop0: partition table beyond EOD, truncated [ 1991.870508] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:45 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:45 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfdfdffff00000000) [ 1992.219358] Dev loop0: unable to read RDB block 1 [ 1992.219859] loop0: unable to read partition table [ 1992.220564] loop0: partition table beyond EOD, truncated [ 1992.220787] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1992.352438] Dev loop3: unable to read RDB block 1 [ 1992.357366] loop3: unable to read partition table [ 1992.377929] loop3: partition table beyond EOD, truncated [ 1992.401206] Dev loop3: unable to read RDB block 1 21:13:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1992.428960] loop3: unable to read partition table [ 1992.450535] loop3: partition table beyond EOD, truncated [ 1992.456515] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1992.470497] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1992.476818] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1992.555190] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1992.584827] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1992.676597] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1992.683344] Dev loop0: unable to read RDB block 1 [ 1992.683559] loop0: unable to read partition table [ 1992.683811] loop0: partition table beyond EOD, truncated 21:13:46 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xfdffffff00000000) 21:13:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x4]}) [ 1992.683867] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1992.855382] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1992.879265] Dev loop3: unable to read RDB block 1 [ 1992.884249] loop3: unable to read partition table [ 1992.914631] loop3: partition table beyond EOD, truncated 21:13:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:46 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:46 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xff0f000000000000) [ 1992.949362] Dev loop3: unable to read RDB block 1 [ 1992.949477] loop3: unable to read partition table [ 1992.949761] loop3: partition table beyond EOD, truncated [ 1992.949814] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x10]}) [ 1993.385196] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1993.447689] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:46 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffff1f0000000000) 21:13:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:47 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffffff7f00000000) 21:13:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1993.519766] Dev loop3: unable to read RDB block 1 [ 1993.519792] loop3: unable to read partition table [ 1993.519844] loop3: partition table beyond EOD, truncated [ 1993.537105] Dev loop3: unable to read RDB block 1 [ 1993.538320] loop3: unable to read partition table 21:13:47 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1993.538982] loop3: partition table beyond EOD, truncated [ 1993.540677] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1993.558380] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1993.592918] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1993.659501] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1993.774206] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1993.783327] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1993.795854] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1993.804326] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1993.810996] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1993.892100] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1994.072007] Dev loop3: unable to read RDB block 1 [ 1994.072557] loop3: unable to read partition table [ 1994.073541] loop3: partition table beyond EOD, truncated [ 1994.073918] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1994.103449] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:47 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffffffff00000000) [ 1994.374839] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1994.441199] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1994.553896] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1994.569073] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1994.632070] Dev loop3: unable to read RDB block 1 [ 1994.633358] loop3: unable to read partition table [ 1994.634573] loop3: partition table beyond EOD, truncated [ 1994.634641] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x2000]}) 21:13:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1994.646733] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1994.759039] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1994.796112] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1994.804288] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1994.846696] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:48 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffffffffffff0700) [ 1994.951920] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1994.955917] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:48 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffffffffffffff7f) 21:13:48 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1995.031136] Dev loop3: unable to read RDB block 1 [ 1995.031250] loop3: unable to read partition table [ 1995.031903] loop3: partition table beyond EOD, truncated [ 1995.032113] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:48 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1995.145448] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1995.440418] Dev loop3: unable to read RDB block 1 [ 1995.440549] loop3: unable to read partition table [ 1995.440814] loop3: partition table beyond EOD, truncated [ 1995.440887] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1995.538274] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:48 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0xffffffffffffffff) 21:13:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x4000]}) [ 1995.594181] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1995.647030] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1995.655706] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1995.672497] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1995.695973] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1995.709001] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:13:49 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000100)=0x76b2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x10000000}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) 21:13:49 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x9}}, 0x14}}, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000080)=""/78, &(0x7f0000000100)=0x4e) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 1995.716534] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1996.055433] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1996.062740] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1996.094076] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1996.116445] Dev loop3: unable to read RDB block 1 [ 1996.117058] loop3: unable to read partition table [ 1996.119023] loop3: partition table beyond EOD, truncated 21:13:49 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1996.119089] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1996.211131] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1996.402957] Dev loop3: unable to read RDB block 1 [ 1996.403272] loop3: unable to read partition table [ 1996.403902] loop3: partition table beyond EOD, truncated [ 1996.404033] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:49 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000100)=0x76b2) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000080)=0x7, 0x4) r2 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000100)=""/110) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) chmod(&(0x7f0000000340)='./file0\x00', 0x40) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(0xffffffffffffffff, 0xc01864ba, &(0x7f0000000380)={0x0, 0x7fff, 0x6, 0xe0e0e0e0}) sendmsg$IPSET_CMD_ADD(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0xe0, 0x9, 0x6, 0x201, 0x0, 0x0, {0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x1c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8}}]}, @IPSET_ATTR_ADT={0xa0, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x20}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x8}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_to_bond\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2d}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5}}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) 21:13:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:49 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1996.493366] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1996.503406] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0xff00]}) [ 1996.552682] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1996.611241] Dev loop0: unable to read RDB block 1 [ 1996.612681] loop0: unable to read partition table [ 1996.615554] loop0: partition table beyond EOD, truncated [ 1996.615677] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1996.812657] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1996.843196] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:13:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:50 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r0 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) read$alg(r0, &(0x7f0000000080)=""/30, 0x1e) 21:13:50 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:50 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1997.005026] Dev loop3: unable to read RDB block 1 [ 1997.005056] loop3: unable to read partition table [ 1997.005116] loop3: partition table beyond EOD, truncated [ 1997.019548] Dev loop3: unable to read RDB block 1 [ 1997.019903] loop3: unable to read partition table [ 1997.021729] loop3: partition table beyond EOD, truncated [ 1997.022134] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1997.036355] Dev loop0: unable to read RDB block 1 [ 1997.036469] loop0: unable to read partition table [ 1997.036764] loop0: partition table beyond EOD, truncated [ 1997.036793] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 1997.047973] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:50 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x0, 0x0, 0x1008044, 0x0) [ 1997.427659] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:50 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:51 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40002, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000100)=0x76b2) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x3, r1}) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x3, 0xd0200) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000180)={0x2f, 0x1b, 0xc, 0x11, 0x6, 0x8, 0x3, 0x100}) 21:13:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1997.481888] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1997.564133] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1997.584288] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1997.591451] Dev loop3: unable to read RDB block 1 [ 1997.591784] loop3: unable to read partition table [ 1997.592739] loop3: partition table beyond EOD, truncated [ 1997.592897] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1997.712704] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0xff01]}) [ 1997.898961] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1997.922123] Dev loop3: unable to read RDB block 1 [ 1997.969998] loop3: unable to read partition table [ 1997.979879] loop3: partition table beyond EOD, truncated [ 1997.983746] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1997.985908] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1998.034838] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:51 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:51 executing program 2: socket$bt_hidp(0x1f, 0x3, 0x6) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4008c2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x329800, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000100)={0x0, r1}) r2 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000140)) 21:13:51 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1998.062284] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1998.066011] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1998.070019] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1998.204025] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1998.313104] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1998.321389] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1998.329265] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1998.470872] Dev loop3: unable to read RDB block 1 [ 1998.470899] loop3: unable to read partition table [ 1998.470959] loop3: partition table beyond EOD, truncated [ 1998.480291] Dev loop3: unable to read RDB block 1 21:13:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x40000]}) [ 1998.480523] loop3: unable to read partition table [ 1998.480982] loop3: partition table beyond EOD, truncated [ 1998.481322] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1998.517602] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1998.628752] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1998.642647] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1998.664613] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:52 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x600000, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x7) 21:13:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1998.724017] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1998.734052] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1998.800971] loop4: p1 < > p2 p3 < p5 p6 > p4 21:13:52 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1998.985601] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1999.014145] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 1999.030487] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:52 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:52 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r1, 0x0, 0x80, 0x4}}}, 0x90) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000080)) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000500)=@migrate={0x13e4, 0x21, 0x400, 0x70bd26, 0x25dfdbfb, {{@in=@multicast2, @in=@multicast2, 0x4e24, 0x1, 0x4e23, 0x3, 0xa, 0x120, 0x80, 0x2e, 0x0, r1}}, [@tmpl={0xc4, 0x5, [{{@in=@loopback, 0x4d6, 0xff}, 0xa, @in=@multicast1, 0x0, 0x2, 0x3, 0x20, 0x9, 0x6, 0x8}, {{@in6=@private1, 0x4d2, 0x48}, 0x2, @in=@remote, 0x3503, 0x1, 0x0, 0x5, 0x0, 0x84, 0xef04}, {{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4d3, 0xff}, 0xa, @in6=@private2, 0x0, 0x3, 0x1, 0x20, 0x80000001, 0x0, 0x8}]}, @proto={0x5, 0x19, 0x32}, @algo_aead={0x98, 0x12, {{'generic-gcm-aesni\x00'}, 0x260, 0x0, "1b28d526c02895e2528e16e89d28ce908be6b9ebf7c3b58c979e8d0a1f2b5f592408a0f250082b38145eab362f2873cec1933235febe7d3c08e1fe4cf447645431eafa66ade305ff6457170b"}}, @lastused={0xc, 0xf, 0x200}, @lastused={0xc, 0xf, 0x6}, @migrate={0x9c, 0x11, [{@in6=@private2={0xfc, 0x2, [], 0x1}, @in=@multicast2, @in6=@private0, @in6=@loopback, 0x3c, 0x4, 0x0, 0x0, 0x2, 0x2}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@private1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@private2, 0x2b, 0x0, 0x0, 0x3501, 0xa, 0xa}]}, @migrate={0x134, 0x11, [{@in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@local, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0xff, 0x1, 0x0, 0x3504, 0x2, 0xa}, {@in6=@private0={0xfc, 0x0, [], 0x1}, @in6=@empty, @in6=@remote, @in=@broadcast, 0xf6c24063ccc418b1, 0x1, 0x0, 0x3507, 0x2, 0xa}, {@in6=@ipv4={[], [], @local}, @in=@empty, @in=@empty, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff, 0x1, 0x0, 0x3500, 0x0, 0xa}, {@in6=@dev={0xfe, 0x80, [], 0x3c}, @in=@remote, @in6=@private2, @in=@private=0xa010100, 0x2b, 0x3, 0x0, 0x3505, 0x2, 0xa}]}, @algo_auth={0x1048, 0x1, {{'cbcmac-aes-ce\x00'}, 0x8000, "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"}}]}, 0x13e4}, 0x1, 0x0, 0x0, 0x48040}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{0x8, 0x0, r5}]}, 0x2c, 0x0) write$FUSE_ENTRY(r2, &(0x7f0000000440)={0x90, 0xffffffffffffffda, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r3, r5, 0x80, 0x4}}}, 0x90) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001900)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="c18f000097f4000000000500eeff040099000000000000010000000000000000000000000000000000003856d555869d5fb7b1eff22ab573105448fad2548c44"], 0x20}}, 0x0) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r8, 0x40045730, &(0x7f0000000380)=0x3) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r7, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x6feec007}}]}, 0x20}, 0x1, 0x0, 0x0, 0x800c040}, 0x10) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/locks\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r9, 0x80184132, &(0x7f0000000400)) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 1999.038661] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1999.040539] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1999.067252] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 1999.241519] Dev loop3: unable to read RDB block 1 [ 1999.241817] loop3: unable to read partition table [ 1999.243373] loop3: partition table beyond EOD, truncated [ 1999.243631] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1999.375066] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1999.376850] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1999.385436] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1999.457556] netlink: 'syz-executor.2': attribute type 153 has an invalid length. [ 1999.586419] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1999.601548] netlink: 'syz-executor.2': attribute type 153 has an invalid length. 21:13:52 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r1, 0x0, 0x80, 0x4}}}, 0x90) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000400), &(0x7f0000000500)=0x4) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000003c0)={0x0, &(0x7f0000000380)=[&(0x7f0000000000)="0c5f49229db8cd0d045ba7fa9b2a13f1cb8c51b6c06dd212ff44a9d6e09e2090dca303223a2b9ecb2a8cf08bcb0337ca147a699090c4e938bb40be410eabb488e41145", &(0x7f0000000080)="cb16e30cd9", &(0x7f00000000c0)="5ace51f73e8e38a155de64196542ce9383b3ba99f09227d0cd836db316907d0161defce550f2198df831079377bdfbb6fe50a841897885541b81ef9738ffb0faad6b2f78796ed2c69107ffaa44df3bad507e6bed80ff80585a14198758b4170e94433a17ee3dc77058a0ccb000e860cd0df60506dc1aa460243fd96c706db7c037c63ba028439284847405f19a7d50a581671c37e60b84c580c9510aacd6ab8fa4d0be", &(0x7f0000000180)="81a6910fb11d8005009f87f2f5c78366e76e822716834aaf9d6cc6a44d33767075945767c1a4d9dc2710ba142aaf8ade421a8cb8acf224038ccf6dc73479a0dadf2a32fc19532f62d850c72911ddcf3134eb160c1129ee8c7d59bb94076b0aa9cb7c8e3e0407f3c5aa34a8705d3c0ba4924674277a948efbd457155ec6d239457cd35f08a634ce2cf7d1537d01009acf38e4b5d3d93e0381452412137a3daf2509805812c7488847bba69fd79c57da88c26b08846dc0e727dea544b3e783dfe4ce007541f7e1a5830e445016fe29a1a6aea68f7479d7", &(0x7f0000000280)="f351cb6080f0faf0", &(0x7f00000002c0)="1018f541daec2792ad077a66210c3aed8d29cac6cb8c29c7cd6c69710b40d0fc153c2693846694f0e9139510ef41973aa277b1c09803b97c61280cac99009d6b442a84645c7a33f5f0fb2138c589a677f2ea2746ead233bda920beb9d615b6191101e381ac6dcaf6813fc3be3ef5ac17962bd3c5a4a53c73322caed76380e180aa661758d9af9cc7f4508ea762998a9399ab028eefbd2574fcaff2cc116458746b236b6f9af4e7f202c9f473701a9e899596c09a2f2e9b68f76a902a94"]}) 21:13:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:53 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000100)=0x76b2) r2 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f00000002c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x5, 0x4, 0x4, 0x0, 0x80000001}) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x101, &(0x7f00000000c0)=0x2) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000240)=0x2, 0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 1999.639925] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1999.675692] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 1999.691683] Dev loop3: unable to read RDB block 1 [ 1999.692709] loop3: unable to read partition table 21:13:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1999.693995] loop3: partition table beyond EOD, truncated [ 1999.694127] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1999.703312] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1999.812467] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 1999.831343] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 1999.859094] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 1999.922751] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1999.950449] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 1999.952814] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1999.983624] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2000.104735] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2000.145977] Dev loop3: unable to read RDB block 1 [ 2000.146775] loop3: unable to read partition table 21:13:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x4000000]}) 21:13:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:53 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:53 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2000.149478] loop3: partition table beyond EOD, truncated [ 2000.149514] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:53 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r1, 0x0, 0x80, 0x4}}}, 0x90) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x2d, 0x6, 0x0, {0x6, 0x3, 0x4, 0x0, 'bfs\x00'}}, 0x2d) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x5084e1, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = geteuid() write$FUSE_ENTRY(r3, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r4, 0x0, 0x80, 0x4}}}, 0x90) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r6 = getgid() r7 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{0x8, 0x0, r8}]}, 0x2c, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x1}, [{0x2, 0x4, r2}, {0x2, 0x3, r4}, {0x2, 0x4, r1}, {0x2, 0x6, r5}], {0x4, 0x2}, [{0x8, 0x1, r6}, {0x8, 0x8, r8}], {}, {0x20, 0x4}}, 0x54, 0x0) 21:13:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2000.600440] Dev loop3: unable to read RDB block 1 [ 2000.601351] loop3: unable to read partition table [ 2000.602678] loop3: partition table beyond EOD, truncated [ 2000.602732] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2000.635432] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2000.700585] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:54 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) accept$inet6(r0, &(0x7f0000001540)={0xa, 0x0, 0x0, @dev}, &(0x7f0000001580)=0x1c) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000080)=""/108, 0x6c}, {&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/110, 0x6e}], 0x3, &(0x7f0000003680)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/50, 0x32}, {&(0x7f00000012c0)=""/251, 0xfb}, {&(0x7f00000013c0)=""/191, 0xbf}, {&(0x7f0000001480)=""/162, 0xa2}, {&(0x7f0000003740)=""/4096, 0x1000}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/13, 0xd}, {&(0x7f0000003580)=""/199, 0xc7}], 0x9, 0x0) r2 = geteuid() setfsuid(r2) [ 2000.828865] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2000.918520] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2000.928381] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:54 executing program 2: setitimer(0x2, &(0x7f0000000000), 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000100)=0x76b2) sendmmsg$nfc_llcp(r0, &(0x7f0000004d40)=[{&(0x7f0000000040)={0x27, 0x1, 0x2, 0x5, 0x51, 0x8, "4da1406fc89b0d3b2ca300d3d9ad0305c43d1b7447a73e8d37e743efa899ce8111ab77d9817643885ba16ba5536bf59457e33733a54e1e854c0ba135b57e9d", 0x13}, 0x60, &(0x7f0000000400)=[{&(0x7f00000000c0)="3a973649da3f37dcc5eb10b56e575e377e96728329e595791ad46bacb17baf421e850a9afc753a84b2ebd2080ea7", 0x2e}, {&(0x7f0000000100)="8e1d18dfdd442b9fe18a3f1ed7c89975c314e30432e329b785288bf9d273756965f7d3d7f2260fef28fa9971f94bef67d030e3ade33c3ef08253332ee57727b1eec335b309c79c1cf53fb33f7cef84e5edc68899993a58fb673edb87aa6e72cb24d44542911e8043b83c93dda838c9ce4ce21d89c58002aae8c1ff77a95b2296aaeb1f72262558", 0x87}, {&(0x7f00000001c0)="ab945659a895f8432944ac335dcb6c6b8809154c9895d35278383953c149a1a94bd3417a241b6ce3be0127e283a6b99156048092f97787595f94d52c0a9f739f7233a9fe0abae6a1389c4cb5d4b9b52a4d72871d17a195722d9038d2621e3a5ef8d2", 0x62}, {&(0x7f0000000240)="f132e82f5de00575bd1a4f367c0159200b9acea4ad42e5854418a2baab72c9f030d23f9d4676cd5dae5afecf5258d3ec3dd6f4a0f353198c4b80517f309eea60b2aa753248ac9599e1061ff901379bceed8721b08b3b00fe3e34ae84861bfc53ab4907c603008b2fe4a4fda72907db9d86da20ed8131d571e8e4d75e11603543a1aef9a24fc56e74f4051b4d", 0x8c}, {&(0x7f0000000300)="41174948b82b08abf4d2c66d3c6ea1f640fc26c1bf8b0f7acb268dd2", 0x1c}, {&(0x7f0000000340)="a9425f76cc94040708c43cb11ef2f010b3e8adda63f5a087de9fcd789f5cdca7eee802e1322b9c5e7c9148eb402dd34300b4ae5488b10e33edbf508dc48f12afbc5733c410bcedeaeef644825137899f2a1deb7a4375325475eed765e29c85095bbc7b99cbb6b06e8b7c4f3f9093bed7a3c5c65f06c33905251cb9e966c040f77d6b26e651dc3b1178dec0013a49de51860d84741fcfdf2b30de775b35bfd68fd568f7252d9e18", 0xa7}], 0x6, &(0x7f0000000480)={0x80, 0x1ca, 0x40, "f783e2c961e6a3482c2a116ee31b7ef1a150609abd2520655a8cf7116fd13184d59fa89881d09475d55e9dee9f8d46795a8312472cf69b68469c7725f99c21e6c9a72ec05c75c952ab96c165401128fe2b8e3025fe662d3e60042b7a8ca69c5f837e0d8220a587be07"}, 0x80, 0x2000000}, {&(0x7f0000000500)={0x27, 0x1, 0x0, 0x7, 0x1f, 0x7, "48b962af0a5a4dd537c0f13df37bae8615bf8f81b1b6deff2e77285f58ccdd93f23136e096941351d01a4c20be9a99650fc490585b9a6a3e023851c81fed29", 0x2c}, 0x60, &(0x7f0000000580), 0x0, &(0x7f00000005c0)={0x30, 0x108, 0x54a3, "c69adf558a7f1d53e2cabe822ed3ced18554229ccf600a4b04cb8ccb"}, 0x30, 0x24004840}, {&(0x7f0000000600)={0x27, 0x1, 0x1, 0x7, 0xd5, 0x59, "85d026aa80b81d3974f1358660765482903bbe0c6a19039cb1695013809703b048e803d99d06d2a3242d06246f6bf633fb27735739e7205787067d9c2ac49c", 0xd}, 0x60, &(0x7f00000006c0)=[{&(0x7f0000000680)="59ff0a5100b2cbeb5f47018fafb7c81c0bf25c71e5846a81a2fb6a01bee49a55", 0x20}], 0x1, 0x0, 0x0, 0x4005}, {&(0x7f0000000700)={0x27, 0x0, 0x2, 0x2, 0x9, 0x2, "36fd61840dd817e72ab3e422d84bfb1953a2e66bd4047d9f65b4fb72d811900b985f669606f90a9aa2225b514106779397e55be6d6d5852604ed324d0bdfad", 0x20}, 0x60, &(0x7f0000001c00)=[{&(0x7f0000000780)="fa5f6253462419dca9176901420966304583ddae77bce2a7a2da7c03168e5c513d9d9c402c511c7cf24f51960de2d6e9b0a01c3d521c2aa8a27f93ff1fda8b5bba54fc4c267633e6f190a85a57d40b22dc724cbcaed7b8e54054d1eac6019eb342a369cf337338920b388a59e684673f22759d2219962251b6e8c1170cfd87462c1edfddc7823931bc7511fff7273f5aed80cb67bafab95209ae7eed43abe2a3ce8a1c1558177b128d809d44082fe4983eaa6418e3d0a8025ac43e138aaecedaa278e5adebb6ed2e20d049dabe3e70ad82bb0b909561195b193c2fe765b151d83f0733f8b7337399eb3cd083b8f06593d692e0b8a3f57f3ce44ab75d49ccb749e1e5b1492f9527939f06e3502b6b2919ef220258f5f62ccb6af8313f554a3db54c0b1ebd03013b00fb85a53a8545622b22c3f2bfddfcb127c7f71ade61f511cc44d9f63da4fa799c4d7d04a33d544ddd3a997a5286d8ef6cd8979df1eaf744260765bc6a877854e2f3f6b88ed266c581fb8aae9dc6eaa6d4f99009b004663c85799766d3a9790c76d34723802476168be2de8730f0481a3ce1055d14d9952e11fd12add28b2a66b08605d5f2447d9202fb569199b183dc1725c16d858b6188b106a0678571e2dbfa020c902973d1af5d89594102b9de135e14a43bcb7cb9a9716c675660c32a64a781fd745ec5f30f1ebf6f608f82ac5ecdbd2559479122c879995501b58971c30561459b0b45b716dee017e313cd3c6d3f7acabac77203b6243343c4e8c3cafaaa6bd0ac2cb22e5ccdc0e56b84530afa469a9ea7008cc74bd9bfbaa84da5b4d1364ecce44d2b6dd4bf2cc5e89e3c47b34eecb359c2fc5adc483d9cedc176a0b498834298e0fa512889aae51333276a20f6bd70facf1d2fb7031e98cbdbeee36799234b261692db50ec2596d5b9efd321aef66746425ab0d2d1dfde2aaea6232e0ccc8a5fb5e9e4b70a8449cf5caa430fa60457f09cf3e330d4a66525c40dea16e750af1b5409f2a1ab27a3c2801c933492e3c4239c27fb17dc7b69360885f20fd0d325a432f3bb1397f137ce115b7d7c6e56ffeab709a797dea9db84b9a7febfeb4e5b6a617675ba0623fe6de48632741dca9f5926ba1392b956c6c5cecaba6b8d10c4a57806e2b139e03ed45a4add2513e79ab812de04069bd4f4dd23b7c6a3e5826b2260f0f15b226c9f724c4325f0b680052a2d19e2b7b6a4de0f183364db5355cf03852e2574cc6a3ff4e2b7a36b1f91b482ee2b37077594c8a21734636b1c7b62ab80157f5ad9c71057a9d7a00b2f903e29880ca4a795c51cd37ab368706f2bfa0a8397a88d0c6b5a30b186968f07a3697b4aad2e0abf6f40b457d4fe26039dbce6c202b9642c5f5502ecafb3bf0f78595f1fbb45771b438e766cf9280a08d9074448133e86faba039926519f2ff0d6313a7dc721cd11aa9e0a5a3bc12d03742bf12f349baa93343b75363c8315e4acbce1f5c3ff27c1a68a84dec7612d772a5ac9ccf76a711c1298c87eacdd197f324b902131b0541da1369f9884ae84a6105bf87d06ee22c60b358460d01694610bdcb2b382b86af5776d55fcbe072a51fb1c116fe530c197cd88f2dc54a0a3551e0f977688e54aa70f2f28b8acb14dd6f03de1341c8704c85a004df5212fa905bb23633747615919946f5dfd5da9d759fc758b54f6e063d35baeba10c167b75c2285bd07de73f0cba9581ba7513b2f134a3c4a759bd5b7b4a48273dbc1f5f5e374978c03f2b9bd82c42a30f1d0174de25a9f70f2fa0c329db11847663f1bd7006f1f4a9ef8e50f65d8e5b140497facfc7a35e623617f2b515b79fbb49e4b68315b64c7e512657050f85aff8220526b6694c710eae864aa4f64690ba072fbf3103b4df7f0c70f46ed8549a14d71bcaeeca4d77d83dd454845557047fb15011cdaa5fb1301249ecccca28fee2b5e8f02e2bd763e29293dbf8ef4e452db2e3225f5f05443cc8377e9175d9356bc97c02eb31ac3879d59391e2ae6e48a7295d2c53470a850c0382322d9bd382305bcc5152c70dd835428a383c5b906bba1224d5f585f26a2a537ad9608b26ac6ee749cbb0c2c260aeb2d52405b0a9e3bd24bbc5ac0c8cc2b75ada24a4c7d469aa83e2c1271461f17a1834c9384931cd30891db47dd2184277c97a2a1f8ba8592fbceb08a02fa7aa3e24785f27bc0099638d6d8875066f67f93516c3e9b910fd0cfb3c44f06ee4127ca9f7691cfa5fa47af36e062e3bff4e7cc305f80eddddbd504c97c03cc177f960a2f4e0900f01e6ff2eda0ac841ede5445a4aa57f2e45fca83bc43059106972a489dce31010717c62aae7474af9e9e6c012851fe661878c3193c5ba94f4fba203a36f494fcb02511039ab03f61feabe5b94ead57c061867c0f211a78d690692556ae5be92d0f4198f31b502621092391060d9399fb330e0279a84d9e5a75719688d6f9446490a4471b8e17f2d91bc39c92d077fa4f8a3356e88399924bfda90147fcb26ba44cca3bbbd7e732cd94aa575f02dc6628f3f11930b169354352add91d5dfb76fca675955462860cac88b781815637519bd3dbb1e77305ecd18db06c1b690921e21d05eb92c5a9a8c39d7b4519845cf956f9d6eb18c783c3bd8230e7e2d862fd32062541151fa07c72ec611e8eef3fb4e2e5a25fb9729a9c27ba0402b6c4d0fcb36cdf1468ce257460f5ce7d3cad0d1f295c079ae77d19da0977ae895466d3a163cf24193514306ce49d46abe84a7ce21945517383bf489de3387c2ec2ff96f3ac30a98192103ef51ed1a36b4af47b288cbdfd6cf7831e32e497474cbb44cc218de085e931accd428fafb83d1900c010a2f8e760dedbbdca0d9da361f5ccefa2e03414a5ecba49ce03f34e6a3a6a1f8c28dd70cff780ec14a2ab18fe800386a2202eaf923b7e11c19569f55311cbf40328676d6309f01e9238d292a2afd496925b3a0fadfda3cec5b49db8251abeb3559e28b8ae29bfd81aeee2b51dc86618e08c72cdde7df40e61e441a9ad7e84795bb7b7992010c5aaa377ed8f446514e2ba74ec7cda3592f9ea021e3a985423026b8ec33cafc82d1d2b63a21c991cb33fddc524a3b7d0c7dffd9afd5f7ab9b4e6c17e3fa528e2b218fc83643351da36537dd238b54461236ccdbbc28dc2d36d5689d80cfa2c3ed516cffcb6fbeb0819267c2fa383281b6bf8cdd0820348750c42333a06a39f268d551c924ad0f2730e94bcc1c809ebfb8f1a1ec9b8825dafa223af0466b123c707331f5e6c19a41895544c9b697664ea47a70d1dc63c1e0c139c81d62f31293a891d6c3606ff7e2a0a0f5994cdae88f121e3f8aefc6f257327cee51d8f90f731963519c35d9fff21cc2958a26864738611f1a5ae993a151fa5cd40d47d8cfe90e62951b4921ac70a79fb76012c4ded8397d2572b2e6f119a9d657e8d4f9e634e3b7ecb77b38a55015d44e58994aecf7571d5e1c9dee7361d78ac96d69b10bc7e548a9c7fcae441531cb119c7a381bb48822f8be9e583c14019ea356374986eb6fbc09488c0c54486a46a09f5b72163fb634a77c4ca333899163950d9373e6ba5354601457f0c58ae48ada6025f1fd9b456f939b9d9f5b83deff0ae02123c8cab442cfe5745e7455c4695d0dfade8433405fc51f001d8639994bee00a99d66de8097a8ba56512f862d93529615c1863d507cbac1bee43197eea1bb2517c2d8d64afebf095525d64f263c9af1a31347db27a64390d11c7d96a4059513513375cf473269451c698ba18a648ed6f840fc87ca1a8bebba9e62c92ff7d24de6e8f57dea1290a2abed11ee53030c1b89dfd9b061d0032682fd8a414b5b3e20e4142d88e4d8bc4c47efbb09c35593809a37a8db08cb56fde297863c6cd7769d061c39280f326a6787829e8d523d35e22df4fcd00b0e5c3b3c2581967890ff8cd3267e991198eae19e1634febd9f3fe747dee0e328532e0ffa4f9c50c950a2ce5a887028bcc537d9eec2ad0ef906cc3e7b7569db01811e8c1e508bbb3b2cf6edcdad926194bd4f808ecede17dc011ed838dc1f1d9e0d74a0ea8ad8705a50c702f05fb3ff02a235df6ebe1b62813a7dc7a5a68291c7fceb5a918af0d071612ce16cb55fc84e599c2a626b6e06fbe8df4baab7722a49c80445a8ee5a4ceb4271e1ca0ad4951990edec5bb281036a25812f18cf78178c299d80799e34545b4164d5048952e313c36c490072efa713d0d564b72b5c8e980f33a5efe941b5669752eb695a20b74dade6901f8f083ddc14478961e4e4729524a51d5e78ac3863aa161aec0429d087f7b5d763d185a77ab6f998c7b01dd5b67fa578d011781c8986fca9a84396c63bc21b1abe3e64de1beaed2d06663d085ba573d6321ae6be9d9c6cf377f260d9970ac9aa886298e5f1dbcc525fd3ed48964c299c33b2487f7b610ea24c2f867261fe11cc91a015cd0b24c0fcf4fdeb096ea64dd37eca41ea518c2a9efb6e7136d497e25fb905d0b539de6f27bfe0f8a0180378ac47e8a50752d9e978d91195f2c1e2726a96d86487d03de897a350483511d4629cd08d5a6fa5154a98e1f195c3064b22e2a64fed6a80f63307f85c647a9957544d658e1993bca8e436982cfa93b0f144500f6b8acc29e56e4b2c55e1ead1c989913e72583825ae622e725752de8535d740fa7066ff4b6fb59ffab5b48ba09b1e48c4ee22c0f2b8e7ddacf53902ae62cbed689b1b4b622d1786e1512e9f9182cffda2347ac1a59277f3394f8e4c3ab61d0b68c0a838ebd38e8ae874d26bd7f335f5d01a090186e1689f78de7d0ed1812dc7b278b1060ebb5846712d12bec58ffe0c1c3e00df2dadf31b757526a7cea6703ca61bc93af12dba9614654982b7e323f0b034c11be230bc2cd552428d5d6793f76b25f0711861a22254f82f340036936cf56f58bee8a740e8e7675f4ad757b3d15afbefdbaa12ece04f64836dbff195c47d97105ecbbdd79fcd5814a2d42581b6a8d385057c9bf49efe1a57345bc546fd3e59a8661eabc7385600fb0b8bbfb5e553bf75b26da6cd7aedfa7edef812b640ef3ec4b240a044ba294d98c84f1ce41ecbb49546a1d81d9f08f983d101e208abc6ba5071d2c50870e102186c3d7822df8cba6246e5ed2bd9d82db22370efd36b7405090be2f1fe7a8f02556a638dca99d755c173b8708a305f86a4237e770a0dd92a854a9cfb55009a17f34e80e09aac4a710c2cba1acaf981b28d725d427ca2478cda66d75e113298753ed08d819dac53491ab2e7ae831c00c2aad8d97703c7b9b3957be21703fe41eb6a91222203251d0b3c53e3a99445e6d260bde1252b229b9ce64157c4b1d84eb0ab580592414eda4e4c5a2d2ad59770b5f82cb65cc1d9af4deae7df5604dda0841d1926de2fddd5a2e188a407337a889e360cdfee5c8662ae2f2ad7a83fbf6c83bd852a2b055c90cca955a873a83d068db8322fa35a499cd54841ff960eb5cbf39d44d25632180741767a67411034d6d2fcea35c7195151d4e287e5480bae313afc37595830cdebeb04447ba891e920339df60571c69f880a26c43ca05e2735888952863a647298f465e767a4823651b8a784c140de4ce0b532b1bf321e0439100ec8386a4dd572efc5b64a65e909b76ae106d3c3876dc66c4aa1a4504dfbea7dc17c69f73eb6307ac994274a6d852b549a3011203e1f631dda6a01e6b519cb0d7a3f546151d14e64c7d76f126ad64d9833534b2982f1739b6a2e8ad957bae9b34355945a443cff9fcef349818869d5dfc81d5fba4b254d2e51ca2fe4f02ad", 0x1000}, {&(0x7f0000001780)="d6483cfa7824279d94db4987f23fff17d76bfef82f3b11b6503801365851b309c57b16a032d21dac4ede424fcc02337f90a19437071bfb795162e796645c1de78a9ebac6d10d797503eb2c2f998b019f45a0fa9100ca09d44f4b062bb26c90bed12e99082542d50d89c4a3f5720b9699b349ee62b2ce97648bc701563486a24e4fce4206af742fc289edb1bf621fb337fa", 0x91}, {&(0x7f0000001840)="1da7bfbb8b838d0680c0cc54494ae6d6ec387d003122e809d829ea14ff363f517d0b5b5568f7c4af79d1e932b10bbdc78807f3a9474dcd046cc488fc771d103a96e18db9f358054f35b7c68c0e4d8d5e64a9e4e41dd0de5688d849c1", 0x5c}, {&(0x7f00000018c0)="20de0950bb11a5d7fca553060fa3f52ef582079824563b43ad6fd3295da429fa66b346893d19e0f9ce73fcf47f70fc80eb9c1300b489fe917842b8d47e6e9299b09510809ba1ae2c1d580ed3c6ec739e7191353485bac599902048bdeae66f6720f1b3ff26ef87e722f8d5635341f6f6c39eca5f645c89cfd6938eefb3b806d333", 0x81}, {&(0x7f0000001980)="f406eab000b5acdfe3be176b6fd7c9363dd99ccb4fc3635545abc1645824fe9dae170aa795d212e229cc7e8c9b1acdec077514a21f0aba9f2cac65b3df578ea5c0ca36055b6161be1378a67d69e0c46ad2cfb01b2aca044a3646bff08cd3dc320e9c682e11966cb00b831cfa6768933cf15f51e8a0c6e4c834c946c369c52854fe2a21b09dfe64f00f6140b4e5278aa2922fb77d2ab2eff70821a7d6252760ae3842c28cdf5d46761ea3b9460e4cffc4ff2f3f8d5da7f7322831092c982452b6e9611f793f14", 0xc6}, {&(0x7f0000001a80)="c313d568a99100b533ba35c97b548fa8c19126f2447651d68409c747ae9eda94332269e04518509402390fda61", 0x2d}, {&(0x7f0000001ac0)="be3fee25ffb081b09c5dc028284698b52fcea70506f32514d349397d02e92b7085534e728ad24388a0c13330ace04adfe4658735659d73a09a4339", 0x3b}, {&(0x7f0000001b00)="b128c9c7108d6624a23b527b3f548c9b78715b456ed8212c9c2e856e2c7767f8fa725c66082f387729f699d1074fb06c53990589c6a000039fbbfc4e2890314aa4ab8b4178180f284ec874ed5869609238127eaf1dafa243298621122a88c6e879ef46a19231f182e00b8af366f7fc9c21a814df6f5f2c1a09f68610c7f9a4e543ed3cb4f3ddf0d9b9b858348fc2156e834175bf6890420937d3ba407501175e38baf64534b372fa4d115a0bb6da1d8263339ef086a8fadc9ba812c7b6361ad7fc7ebd2d881c27cf566a74fb0782d756765d37", 0xd3}], 0x8, &(0x7f0000001c80)={0x90, 0x3, 0x5, "3c16878ec7c30067928bd6af18e423c5e0a8be58fd4d3a5153786acb314e4c8678e965c46327826632168426f31fc08aae58c688fec52152d3e37c4f31772e794452e821a218366fe12346dbb98ac7d5e0f96eb502926520cbb206b2fe5a6ae1ea9f9eb2b6c5a3e3faa31473712a18dd93e6fc2fc4dc170d632300bfe578"}, 0x90, 0x24008855}, {&(0x7f0000001d40)={0x27, 0x1, 0x0, 0x4, 0x7f, 0xc1, "4c8838282db9960862f46add7466086e9afbab2a5b3e148c7cc8d73568ca148b85da7415ad08a915dd6a9fa7147d91f6a038043cd51ceccf85aa0159ae7909", 0x37}, 0x60, &(0x7f0000002f80)=[{&(0x7f0000001dc0)="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", 0x1000}, {&(0x7f0000002dc0)="a3b664d589eef3a4bd3b5e4cb36163eb1c9eaa97d8e0b331640b1157a569b164c7d817d1f36e9d5e5a9d382db0d5d997c367ba0e50363d4236644b03ccfe214dce37a45dbf324efe152634f1fefe4ef39ca8a9cf111a882f8cfa6a1ac7e4def5d68e3af7a0a7f1f0345b535d854394d25989857e0315a46af391c44bd1478a7d4f11b60b4f2b41a9e17478ce5a4f5c8eeb3cc62ccb2391b39eedc86688eec62e46fb379b3212545b955fba6a", 0xac}, {&(0x7f0000002e80)="5c1f6fe11c00a0c68c60adfc8ad35a61778aa99523addf20d014f8b9e9954f356ffa79090896e6c0dd6573e2f9e6bdea8617151492ee03cda7efc0354eb509e1166ef2016d3acf57f7ddc003e7c98c09af9b4f31d3dafcb08bd4ffe9be82817f8eee3ef31e2c6cf0b6c42ae7685499eab4f0280c15072ac5f6db1682bf51c182ffcf4acef8a1880789bbac1529f25bd27299fc907c05d387a789b1e5a1da8683edbe62063882a959ed0d0ae0096bbb6adbbb9d7aef586e46acffe6ef04a5d1f4206b3dc3b3b2dd1146d8e4013fca48ce14", 0xd1}], 0x3, &(0x7f0000002fc0)={0x110, 0x191, 0x7, "71b63bc7a9cfb0ee81a602c33fb8389d13a45c98dc6583738a86cb6ca6502d415211fbc1c837d9501a677846df4ba7a7a6020a4f8dc177733cbb8aed328a3c982149c7b1edc00ce4b86381627d4b16d5c625493990ca251e2254f902e935d6d233991228ab63d8e187a331ed35cb0e0b6791cd748894a2319c1fcbe6f6ff82348f4b61a9b6a2d7bca8876843330ff695cb2b93dd9cc13d78677d783c15bd0acfcc1b747a83ebee8561ff60733f078dd029752855f86f6aaf5ceaf83dde0ddbd1a21125eb6d5a3226a423378f26754e16296b56946acfa6867a663553d00ca0abb7103d946d5635bcf8820fb7224f3b6ce41011b115a4df917c3e"}, 0x110, 0x40884}, {&(0x7f0000003100)={0x27, 0x1, 0x2, 0x1, 0x1, 0x40, "c57e6c139740629da56e81055d0a32d99fe67b5c83b59a396a4ddc97173fc684f2c7d91873331e0d9a182200494ff8207e904c860effb4c38e8bd22756f86c", 0x2b}, 0x60, &(0x7f00000033c0)=[{&(0x7f0000003180)="8fac7d", 0x3}, {&(0x7f00000031c0)="68bf328efb586fb9641ca0cee90c2dda324378c517d0962c4835f6f9ec12d135b28ffe2af3ed5b09ad257a9a8748548d7c10663fe264f98f02692a8365015d78636d9b4297ff6b912d5df2e2021f05fe8d", 0x51}, {&(0x7f0000003240)="8e99b0d08cd0a86cede92064984264fc172c124110d4aa2d558497af867b3c7d96037bc13ad08f55f0560406c67bb03f29d9f619fa3a030de8", 0x39}, {&(0x7f0000003280)="0cbad9347cdf0895e0812a191b5b21f1a1ba429f6800014401af13f530d37dea121bcf822473e6ab878264f572dbc597c579314925de18469ee539c9d3728ef8e95fe1b90a1a4ae6ff0599f1587a1c28bacf8bce3d6ea4d44861c1f1b138d19f2342cf05beac13591f276837aaca83f3e5c6967c4280e37c2dafccc686cdda5fcaaf9e7d35a3fe71c4b4a962455d", 0x8e}, {&(0x7f0000003340)="1f750302b0f1e0f4f922b705d0cb35b6150c4a40c9b38152e6b544c0a66aa9877ffa9c16b49793a12a158e5b478901aa50a26651a367fd5fa1e5878433bc24c973b4d2bcc328fc3235874b44a991a7cddb7573f2acf73ed4ed716c6acdec1427c291f988", 0x64}], 0x5, &(0x7f0000003440)={0x78, 0x119, 0x8, "3abbb8cdfa036c424f337377977263874999e6104d821abbcbef844b41ff442931e1b8ee7f296c9b9519e29bb74de32065ebdc22cf2bf7e91cf0bb2b2ed448a67c9b808592c3295850fbdda865eecccb4a541938ee162b36919d0754e8169ee8b0df9dc2778f4a"}, 0x78, 0x200688d5}, {&(0x7f00000034c0)={0x27, 0x0, 0x2, 0x1, 0x4, 0x0, "2e81e6869731d7934e5398f1c0dcdf9dbfc15ccb19ff70cf93b20dee684239cca253ef7131292e735d16df4437cc0669604db6a4634e88f8b5bf5b68248d02", 0x29}, 0x60, &(0x7f0000004800)=[{&(0x7f0000003540)="ee1b71027c52b8398c30c9343235937c9600215a83277fc11e0eea6338dd6e6ca697868d2df8e400c03a4045c26e663266d35f5ce382df9d9066c87872e01130359bc357bcc55a7babbd635c5de3f321f3fa87a47fd1f94184f6ad60aab96276d9b7592b50489dc3bc90f98f77588c32eae117e5b9440bd32fcc137b3917ff579c90c1a29b000cd6ebbc6f2477889c5fb190d926fe153d7db7db6e5892a33bbe359c", 0xa2}, {&(0x7f0000003600)="7457dbf605edbb07aca4d89d14", 0xd}, {&(0x7f0000003640)="5ac75d4eac69755c", 0x8}, {&(0x7f0000003680)="1fa58b2f2fd7b812fe133564f85d6128b262a05f591440bd32207fc262b62cdc9b720dde453c7c9434e36a53e13444294b955a4416463214ce098b1993489e1f69e2e71f2a1828f51596fc16ee940106a3986c1369cef51f36ebd2aebbb7684fa15f74d62c40eaa8bd514471af7c8700147373fc0020a5db3e9428b1b22d3c52478e95f1556be7af34c61b1cf4b657ca349dd57e0f89c05ee8ee0d96cfd57a65857b44208b901f7b5c3fc29ce5f6fb61bb02e83ae33ec7c73057251372130fda", 0xc0}, {&(0x7f0000003740)="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", 0x1000}, {&(0x7f0000004740)="b3efb5f496859f8c07d6dbb6e5f5524ac853b3fef8355f6727aed3bbb7c63a7613b270cf8778d3ba87efe21d6c9c47743904ef80ac8bebb3b817f42005ae33598c853499131d1812994109c8cd06cada5650c0ad6a52007bc316b5882aada464147f9373b6b10800a561553c0f1ae76cbb63eafa1edfde194d5d1f09142814e614224ed4db41fb53197a6454447deb3af2fb887bb91aa23f8e942e9528c381556b924e4a038243b8680be19ae8", 0xad}], 0x6, &(0x7f0000004880)={0x58, 0x100, 0xfec, "be250650b7bca41172c3828ce62cce0be41ded70cbe842d7ab51c303867fadb3672e3172d06a348e39d4cf3ae55f92b1de01325fb422291d3ebb03992ddc44e88c4f9b"}, 0x58, 0x1}, {&(0x7f0000004900)={0x27, 0x4, 0x0, 0x4, 0x0, 0x0, "968bc4bf9b3a9936f84c0a51435be1f5e7339c3b4d55d745a5b7dd3a5a94be925634e5681c4751bd4ea28376cf667e854ca7d63384cada20d39a103d6ee130", 0x35}, 0x60, &(0x7f0000004cc0)=[{&(0x7f0000004980)="e7091155dc1144b606707003e51395851e1b2a7297d5b2bb16e771234cbc825e287facd95d9461d8cea02eebfdc5332a1b6272e5a9e85010af647e78c3b5120f29843fdb3aaca4e8bd92ee6a1719f8206fa0f51da0390139cd8f3b9e22e4439b5fe710963f6d3ab4c9995fd7c03a2f96141c913d1baa3c588523b6e00490c7458b101aec51e5f4715faf0bce1efa4a201879c0f148ee289981726cbdf7", 0x9d}, {&(0x7f0000004a40)="071ad5254ad83cec08c3adee3f8b9adfcee1603e452e431a08810043cb95a7fced889de73cd2354baf1ccbab4b52f6298a4e4ade09d4db0b21bc252a39", 0x3d}, {&(0x7f0000004a80)="b1792ddeef9f15cf3707b1e4282302d73d5a3b319d297e4c1e8e1ecbd070a5959004cd5fc7dd92e7c45059d6b12acc958dc9267df123857dbbf6f11c8ed0c74d9d123b2f20ca2e3e404b80844164ce1c9f31477adf286fb7288e4e993efe40f740d0eb9c934d4d659043d8342accb5b8717ec14ff62218604ba78d0d49f532467d8ea90a45b520155b1b6416df1d385d15c33c55142aa82cb0521519f16379bd2b42b2ba009dffa7ead46db962474930516caa02bb38e2609f90393bf7d448973c0ebc7e164f3edf562584de807918df6ad526ba43374907d44b9b5940038e", 0xdf}, {&(0x7f0000004b80)="95c76c76a013853d0f39179bd08c5c7f3a7ce96f31e96dd8390a664eec2406ce36d62da5fa229c63f7d6207527d93ffb7c659c01ad8a18a0dd264271e66c9fd09eb8765f32b136c02b9b72e88eb7252690911f63172b1dbd9d6428f585ad8b74fdc3b83f795cc360adce57e86485e0f34621973d1280fc8eee04fb10", 0x7c}, {&(0x7f0000004c00)="ebd91ead63f34ad7fb295fd7ace07109e8d18eb7665f2deede7c2f4639699cc182d49d603bd81ed0bbaa7221df7b5061a70041dff77036fdcc3fb0d2627b61dcc29c9ae9750376cddf3e13de258e94209d285ca351adaf0c694d316e755772b59048e4ae5f209ff28dfb5054f0f4b738322b5db818880c6f91c4a6c3c31477c77a6c66277dec13a134225c936f99a33df1bab172a9cf26363b1e14cadfe15b9d766b", 0xa2}], 0x5, 0x0, 0x0, 0x1000}], 0x8, 0xc0c4) 21:13:54 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:54 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:54 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000100)=0x76b2) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x5, 0x81, 0xfffffffa, 0x80000000, 0x3ff, 0x9, 0x0, 0x1}}) [ 2001.010706] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2001.138939] Dev loop3: unable to read RDB block 1 [ 2001.140648] loop3: unable to read partition table [ 2001.143341] loop3: partition table beyond EOD, truncated [ 2001.146381] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2001.148735] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2001.257396] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2001.322233] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2001.399637] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2001.401518] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x10000000]}) 21:13:54 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2001.408939] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2001.663594] Dev loop3: unable to read RDB block 1 [ 2001.664127] loop3: unable to read partition table [ 2001.664967] loop3: partition table beyond EOD, truncated [ 2001.665089] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2001.778658] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2001.815986] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:55 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2001.839373] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:13:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) 21:13:55 executing program 2: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000001, 0x0, 0x0, 0x8044, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) fallocate(r0, 0x0, 0x20, 0x8001) 21:13:55 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2001.905007] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2001.939465] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2002.048395] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2002.049888] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2002.083289] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2002.162509] Dev loop3: unable to read RDB block 1 [ 2002.164096] loop3: unable to read partition table [ 2002.166233] loop3: partition table beyond EOD, truncated [ 2002.166313] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:55 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) sendmsg$sock(r1, &(0x7f0000000600)={&(0x7f0000000100)=@llc={0x1a, 0x337, 0x1, 0x7, 0x39, 0x1f, @remote}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000180)="6804ccc175a1b2af6415aa9eed68f1d775feebee9c61864ca77c318fa7a5e84b6a41cd6141dac48d7f26b4cacb7f8c710cb3cf3b29893c", 0x37}, {&(0x7f00000001c0)="1676b9bae3a123481fb592445db9604b80fe2dd967a302831715ca10b4716de0a42657d718c712588c6fac4bde80d16ac54b34e8e34f8badfc73875cdb5c0f792f09e1162fb62eef9f6313403b7730fd8939978a6123bd9f9fa5cbe858c03f8ab33312454d30e7156b84f72c71d78e2e3da5d8bb9e8aee4cdf7bc0e1f43c14420fdcff9fad1dc8c1f41ba9a60fbf936e6faa763ad21936f5f4fa03dc908d91d63f57bf6cc050af6fe25bc77e572c5217e4d79fdae98902fbc0e9ea782fae6fc0d9", 0xc1}, {&(0x7f00000002c0)="9a927ee2425cea12ce15d985e289db1ee0675ca302126627e8a45c", 0x1b}, {&(0x7f0000000300)="7855f55e40d5f39e9d2d283ccaafa651b0da6d7bbd22afa5a80b94817264c45a0689642b1b34810a3e753e8f60bb3f0eab1f941a05fc74aa9cad28600376cc0c84439b8d42d6f124ded9d188d7ed5ced9f4f0200e0be9779497380df409e8000b91521f4ed7152f463d13417eb6c2f9454790cf50a715b0f4ce816cce8512301a9d47ece8ca1e5789072291d424dbd8b47d49d0e71612b3c57b415069936", 0x9e}, {&(0x7f0000000440)="a5ff2aee05e4bff3874682ba4b93091272f2b0713af7a8b8829446ec20f22094a8ff250d9e2de3c0b9a61c345a4e9577d6a566771330e5629203a87b5ca29baa47f0140c1a2fbcf425a3637d8027f2145d0ed835bd26d9af83ee19d23b17877d9a4b392ef069c091c25fae354770894c65475919c9b0c7b3d8bb7a9a466d89a10a87f96540b1e64344c2477115dd3fa4117f50b634a3cce0dee4241a397e213d6356fd1fd2bdea4c4e5c8c75ad14b975751a108c2ec48e8665267905087d0492879b6c42ae1fd9530e010005f5684c8046862ea7bdac7b7d9f2d6cd802e3e94e371a2f3e29", 0xe5}], 0x5, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x9}}], 0x18}, 0x8000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$PNPIPE_INITSTATE(r3, 0x113, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendto$inet(r2, &(0x7f00003cef9f)='7', 0xff9c, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r4, 0x80}, &(0x7f0000000040)=0x8) 21:13:55 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:55 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2002.240949] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2002.242459] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2002.267763] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2002.298433] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r0 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) accept4$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x400) [ 2002.676857] Dev loop3: unable to read RDB block 1 [ 2002.678382] loop3: unable to read partition table [ 2002.679581] loop3: partition table beyond EOD, truncated [ 2002.679687] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:56 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2002.682372] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2002.685994] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2002.701125] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2002.778319] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2002.790787] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2002.895356] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2003.055266] loop1: p1 < > p2 p3 < p5 p6 > p4 21:13:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x20000000]}) [ 2003.194920] Dev loop3: unable to read RDB block 1 21:13:56 executing program 2: syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="569e96f562b36d208b52a1776c198e100cf3277e69cda2654536cc44dfe97ec2098c6966bbb5bd2a636547fe39c89076672612218ba0620a10b8b536d54147d86b8827da646d49cf8513648ac27426aebc753d653ef9ce983c749d459a4568f32c0b54ba7dace010e1080ba8cb635fdef705b0e7d7a6318ca3c54c1b491dbc9f1f9c8ddd1730c3ec14f492be4746539fb803d9b90ae7a98d37ce1216ecd1f40964847189139285c1ec1c13a3480d3a407ab4fc7e5c7732bb35c996945cb682fb", 0x5d, 0xdb}], 0x800000, &(0x7f0000000200)='\x00') [ 2003.227874] loop3: unable to read partition table [ 2003.233613] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2003.263122] loop3: partition table beyond EOD, truncated [ 2003.289869] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2003.304138] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2003.326264] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x0) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:56 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:56 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0xffffffffffffff32, 0x0, 0x8044, 0x0) 21:13:56 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2003.384540] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2003.447387] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2003.625079] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2003.671196] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2003.774905] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2003.797027] Dev loop3: unable to read RDB block 1 21:13:57 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:57 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2003.797344] loop3: unable to read partition table [ 2003.797909] loop3: partition table beyond EOD, truncated [ 2003.797988] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:13:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x0) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2004.056786] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2004.109654] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2004.137975] Dev loop3: unable to read RDB block 1 [ 2004.140144] loop3: unable to read partition table [ 2004.141284] loop3: partition table beyond EOD, truncated [ 2004.141375] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2004.212963] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2004.345978] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2004.346778] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2004.418200] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2004.420247] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2004.431087] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2004.541050] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2004.599332] Dev loop3: unable to read RDB block 1 [ 2004.599806] loop3: unable to read partition table [ 2004.600425] loop3: partition table beyond EOD, truncated [ 2004.600516] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2004.684690] loop0: p1 < > p2 p3 < p5 p6 > p4 21:13:58 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x40000000]}) [ 2004.725423] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:13:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2004.890431] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:13:58 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:58 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x3b, &(0x7f0000000180)={&(0x7f0000000600)={0xa4, r2, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x88, 0x14, 'syz0\x00'}}}, 0xa4}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", ""]}, 0x2c}}, 0x4000) r3 = inotify_init() r4 = epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00007a8000)) r5 = inotify_add_watch(r3, &(0x7f0000000200)='./control/file0\x00', 0x468) inotify_rm_watch(r3, r5) inotify_rm_watch(r0, r5) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 2005.148233] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2005.182742] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2005.195328] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2005.230309] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2005.263517] Dev loop3: unable to read RDB block 1 [ 2005.289479] loop3: unable to read partition table 21:13:58 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x44, 0x0) 21:13:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:58 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:59 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:13:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x0) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2005.326296] loop3: partition table beyond EOD, truncated [ 2005.340368] Dev loop0: unable to read RDB block 1 [ 2005.340633] loop0: unable to read partition table [ 2005.342372] loop0: partition table beyond EOD, truncated [ 2005.342595] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2005.354279] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2005.354286] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2005.369387] Dev loop3: unable to read RDB block 1 [ 2005.369415] loop3: unable to read partition table [ 2005.369469] loop3: partition table beyond EOD, truncated [ 2005.548402] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2005.598244] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2005.599842] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2005.603682] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:13:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0xff000000]}) [ 2005.870835] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 2005.906992] Dev loop0: unable to read RDB block 1 [ 2005.921040] loop0: unable to read partition table [ 2005.927264] loop0: partition table beyond EOD, truncated [ 2005.932869] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:13:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:13:59 executing program 2: syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) set_thread_area(&(0x7f0000000000)={0x7, 0x1000, 0x2000, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r1, 0x0, 0x80, 0xff}}}, 0x90) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)) [ 2006.027013] Dev loop0: unable to read RDB block 1 [ 2006.027040] loop0: unable to read partition table [ 2006.027097] loop0: partition table beyond EOD, truncated [ 2006.027575] Dev loop3: unable to read RDB block 1 [ 2006.027926] loop3: unable to read partition table 21:13:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2006.028179] loop3: partition table beyond EOD, truncated [ 2006.028233] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2006.172913] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 2006.330856] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2006.380064] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2006.400507] loop4: p1 < > p2 p3 < p5 p6 > p4 21:14:00 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000000b06010700"/20], 0x14}}, 0x0) ioctl(r1, 0x4, &(0x7f00000003c0)="6b56022c955c4361f808c64d2d1a2cbaeeff08b0356716fdb52f4e732a60eca4374afbb3ae814f8b3cf7cc124274ef1f9f9e") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) getsockname(r3, &(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x80) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)={0x1f0, r2, 0x410, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xac, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xffffffffffffffdb, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_NET={0x58, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xd0ec3fa9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xb2ab}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x46c6}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf045}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffffff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xef5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x43}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10001}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 21:14:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2006.448417] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2006.594946] Dev loop3: unable to read RDB block 1 [ 2006.595688] loop3: unable to read partition table [ 2006.600398] loop3: partition table beyond EOD, truncated [ 2006.600581] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2006.675784] Dev loop0: unable to read RDB block 1 [ 2006.676477] loop0: unable to read partition table [ 2006.677573] loop0: partition table beyond EOD, truncated 21:14:00 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0xff010000]}) 21:14:00 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2006.677742] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2006.894768] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2006.946971] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:14:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:00 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r1, 0x80044d04, &(0x7f0000000040)) [ 2007.143684] Dev loop3: unable to read RDB block 1 [ 2007.144050] loop3: unable to read partition table [ 2007.144827] loop3: partition table beyond EOD, truncated [ 2007.144878] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2007.345702] loop1: p1 < > p2 p3 < p5 p6 > p4 21:14:00 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r1, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x3, @empty}}, 0x80) accept4$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14, 0x80000) r2 = geteuid() write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x8da, 0x5, 0xe, 0x18, "b5e4573bf4f08138f5a5953d43f672f2d6e9d2a880223c795a606390752f7614297aa1e1631d9b3f430523bc5c94219eb272c58bdd9e4aadebbaedcce57e46ee", "f2c243054c8edb54c820141ce5ff8639b52dc4d4c58ba94dc32b58d078e46fc9", [0x0, 0x6]}) 21:14:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2007.401489] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2007.452098] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2007.459500] Dev loop0: unable to read RDB block 1 [ 2007.459536] loop0: unable to read partition table [ 2007.459592] loop0: partition table beyond EOD, truncated [ 2007.472618] Dev loop0: unable to read RDB block 1 21:14:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r2 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000300)={0x990000, 0x7, 0x5, r3, 0x0, &(0x7f00000002c0)={0x9909d1, 0x80000001, [], @p_u16=&(0x7f0000000280)=0x6}}) connect$pppoe(r4, &(0x7f0000000340)={0x18, 0x0, {0x1ff, @multicast, 'veth1_virt_wifi\x00'}}, 0x1e) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x62}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9bbd}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x29}}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x18}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0xa8}, 0x1, 0x0, 0x0, 0x85}, 0x80) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r5 = getpid() sched_setscheduler(r5, 0x0, &(0x7f0000000380)) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000240)=r5) 21:14:01 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2007.472828] loop0: unable to read partition table [ 2007.474235] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2007.474723] loop0: partition table beyond EOD, truncated [ 2007.480081] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2007.572127] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:14:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2007.770292] Dev loop3: unable to read RDB block 1 [ 2007.770541] loop3: unable to read partition table [ 2007.771009] loop3: partition table beyond EOD, truncated [ 2007.771134] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2007.778332] Dev loop3: unable to read RDB block 1 [ 2007.778359] loop3: unable to read partition table [ 2007.778416] loop3: partition table beyond EOD, truncated 21:14:01 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 2007.874180] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2007.973985] Dev loop0: unable to read RDB block 1 [ 2007.974417] loop0: unable to read partition table [ 2007.975130] loop0: partition table beyond EOD, truncated [ 2007.975247] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2008.280521] Dev loop3: unable to read RDB block 1 [ 2008.292923] loop3: unable to read partition table [ 2008.315463] loop3: partition table beyond EOD, truncated 21:14:01 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xf6, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000100)="e78ac23e9060fd8b3c7a51bc53ec93ecb6d4e66328505093aa869d", 0x1b, 0x7}, {&(0x7f0000000140)="71e4b247c3c88b1b", 0x8, 0x1}, {&(0x7f0000000180)="1efcf652638eb8ba49e2c411520491baf231", 0x12, 0x6}], 0x10080a5, &(0x7f0000000240)={[{@dots='dots'}, {@dots='dots'}], [{@obj_type={'obj_type', 0x3d, '^'}}]}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() r3 = socket$vsock_dgram(0x28, 0x2, 0x0) bind$vsock_dgram(r3, &(0x7f0000000700)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r5, 0x5cbde4b9cf2a48ab}, 0x14}}, 0x0) connect$x25(r0, &(0x7f00000006c0)={0x9, @remote={[], 0x3}}, 0x12) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x88400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xec, r5, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xee4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffc00}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_BEARER={0x30, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x1}, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000280)={[], 0x1, 0xfffd, 0x3, 0x0, 0xfff, 0x3000, 0x4000, [], 0x3}) [ 2008.342858] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2008.372101] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2008.394796] Dev loop3: unable to read RDB block 1 [ 2008.421643] loop3: unable to read partition table 21:14:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2008.456558] loop3: partition table beyond EOD, truncated [ 2008.467468] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2008.634824] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2008.730918] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2008.735857] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2008.793478] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:14:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4]}) [ 2008.948124] Dev loop3: unable to read RDB block 1 [ 2008.953038] loop3: unable to read partition table [ 2008.967229] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2008.982254] loop3: partition table beyond EOD, truncated 21:14:02 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r0 = geteuid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r0, 0x0, 0x80, 0x4}}}, 0x90) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x7fffffff, 0x13}, {0x5, 0x53aa}], r0}, 0x18, 0x0) [ 2009.091640] Dev loop3: unable to read RDB block 1 [ 2009.141523] loop3: unable to read partition table [ 2009.152305] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2009.169776] loop3: partition table beyond EOD, truncated 21:14:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:02 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2009.194202] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2009.197662] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:14:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x10]}) 21:14:02 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x140, 0x0, 0xffffffff, 0x348, 0x240, 0x3f0, 0x3f0, 0xffffffff, 0x3f0, 0x3f0, 0x5, &(0x7f00000000c0), {[{{@ip={@loopback, @private=0xa010101, 0xffffffff, 0xff000000, 'nr0\x00', 'veth0_vlan\x00', {}, {0xff}, 0x29, 0x2, 0x42}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x4, 0x1, 0x1, 0x0, 0x2], 0x1, 0x1}}}, @common=@unspec=@nfacct={{0x48, 'nfacct\x00'}, {'syz1\x00', 0x1}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0xe, @ipv6=@empty, @ipv6=@mcast2, @icmp_id=0x64, @port=0x4e23}}}, {{@ip={@remote, @loopback, 0x7fffff7f, 0xff, 'bond0\x00', 'veth0_to_team\x00', {0xff}, {}, 0x32, 0x0, 0x40}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x40}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x40, 0x800, 0x0, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @empty, @local, @icmp_id=0x68, @port=0x4e22}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1e}, 0x0, 0xffffff00, 'batadv_slave_0\x00', 'tunl0\x00', {}, {0xff}, 0x3d, 0x3, 0x2}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x6, @ipv4=@remote, @ipv4=@multicast1, @port=0x4e23, @port=0x4e20}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x1, @broadcast, @loopback, @port=0x4e22, @icmp_id=0x66}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000680)) write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f0000000100)=0x76b2) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000840)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000880)={@empty, @loopback, @ipv4={[], [], @multicast2}, 0x400, 0x5, 0x800, 0x100, 0x8, 0x0, r5}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = geteuid() write$FUSE_ENTRY(r6, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r7, 0x0, 0x80, 0x4}}}, 0x90) unlinkat(r6, &(0x7f0000000640)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'wg1\x00', 0x0}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = geteuid() write$FUSE_ENTRY(r9, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r10, 0x0, 0x80, 0x4}}}, 0x90) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@private1, @in6=@dev={0xfe, 0x80, [], 0x3e}, 0x4e20, 0x1, 0x4e20, 0x0, 0xa, 0x60, 0xa0, 0x87, r8, r10}, {0xb49, 0xb5, 0x7, 0xfffffffffffffffb, 0x1, 0x120000000000, 0x3, 0x1}, {0x1, 0x7fffffff, 0xec}, 0x5, 0x0, 0x2, 0x0, 0x1, 0x2}, {{@in6=@empty, 0x4d4, 0x33}, 0xa, @in6=@private1={0xfc, 0x1, [], 0x1}, 0x3506, 0x2, 0x3, 0x80, 0xbc6, 0x3, 0x7}}, 0xe8) [ 2009.598002] Dev loop0: unable to read RDB block 1 [ 2009.603660] loop0: unable to read partition table [ 2009.664422] loop0: partition table beyond EOD, truncated [ 2009.665943] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2009.689727] Dev loop3: unable to read RDB block 1 [ 2009.689906] loop3: unable to read partition table [ 2009.690424] loop3: partition table beyond EOD, truncated [ 2009.690482] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2009.791593] Dev loop0: unable to read RDB block 1 [ 2009.791629] loop0: unable to read partition table [ 2009.791682] loop0: partition table beyond EOD, truncated [ 2009.792004] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2009.805019] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2009.832013] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:14:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2010.001837] loop4: p1 < > p2 p3 < p5 p6 > p4 21:14:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:03 executing program 2: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="c4d307678ffbcba484a141dbe1496ca0fbbb5d69d828b3ff6f0afd234fe259adf932ea87ad2f1a4e283099a7a697e913458384908ee82ad0d7e5b3cd71b6cf5035d08cc6bd2d31737be708486688a5f2eb6a551f7d641f0abf196dfb435673713ffc12b4f5f56beae9b65fc5b6752ca8f16895314db26c4f18c61ea328fa295131e2a5d9ec79ace313b7299b89ec0df76e475a069bdd6fd23015d398254ae42e908bfaa5147cca79338493089ff9e4906133a3801b77d62465b4cbb80afcab73b68129f5a7bc7e4454a5bf6516133fef0b801cae9fd768df52", 0xd9, 0xfffffffffffffff9) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r1, 0x0, 0x80, 0x4}}}, 0x90) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000080)={0xff, 0x9, 0x4, 0x2}) 21:14:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2000]}) [ 2010.247222] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2010.308999] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:14:03 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2010.382585] Dev loop3: unable to read RDB block 1 [ 2010.388276] loop3: unable to read partition table [ 2010.388795] loop3: partition table beyond EOD, truncated [ 2010.388880] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2010.408775] Dev loop0: unable to read RDB block 1 [ 2010.408924] loop0: unable to read partition table [ 2010.409258] loop0: partition table beyond EOD, truncated [ 2010.409313] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2010.587928] Dev loop3: unable to read RDB block 1 21:14:03 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) execve(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)=')})[\x00', &(0x7f0000000100)='bfs\x00', &(0x7f0000000140)='bfs\x00'], &(0x7f00000002c0)=[&(0x7f00000001c0)='bfs\x00', &(0x7f0000000200)='bfs\x00', &(0x7f0000000240)='bfs\x00', &(0x7f0000000280)='%:\x00']) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/crypto\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r2, 0x5cbde4b9cf2a48ab}, 0x14}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x188, r2, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x8c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2dec}]}, @TIPC_NLA_BEARER={0x68, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @local, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x60, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4010}, 0x894) [ 2010.587956] loop3: unable to read partition table 21:14:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4000]}) [ 2010.588014] loop3: partition table beyond EOD, truncated [ 2010.803306] Dev loop0: unable to read RDB block 1 [ 2010.818376] loop0: unable to read partition table [ 2010.833031] loop0: partition table beyond EOD, truncated [ 2010.840529] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2010.856015] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2010.961268] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:14:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) sendmmsg(r0, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="f46ca4bc0f4430f21afff868b596aac3d44c388bef8e07aa77b8bd79c04311cd7360af159ba7193ba46b5d7d8bc73bfcfe7c13dfc1515881b7ad680a492d642903c77323545df15f51cf5d581a72776dbe4dcbea10b16bc67457e6872db52e556ce7089c0083f3ca752c8ba2f178c8cf78fdb2417233e26bc35618c78ecfcedad159c6d8e62f8a80aaa5c22251cae9333259136e", 0x94}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="56996ec935426b46d8d6b43693866558e3", 0x11}], 0x4, &(0x7f0000001200)=[{0xe0, 0x10e, 0x1, "1e5efdfb8282fc4fb158473ee5ec688f27d421893f38a77533505ee5a97cc5e81ca5588b43da476f257d349c84d720d9581df39a403d481ff88ecb7338adafdf4c324f2aead6f733d60016f4f1f7d90b9fd9c0c8cce4bcd9ed1f4d5d3600f0408994cbeb2367baf1f3c41e30df37daaf910cbcb763446c937c5ae0f90d300aeb36f7bc3ada872621c98b7ec5431cec9943ac38df21128207ebf123c6734c6d8edc1a82fb077a096c89d2a4eea9fa8524139ae22f4a78bf3e7469bdb9a54d5ae8d13e16b3b3293c545142906b"}, {0xd8, 0x10a, 0xcd, "efaf8123605c9df4beb0cbcb5c7d878bd43cb0517f9eaf2a11e5ef9b39e2dbe2d6b11b95dafc16f8c50234b3e5ac5d3533ea01ee1290e3d7e4e2126b3b350864fd61bd237d04037d61821609b45182b215161febb7660b103c2432d60d30abd5b7bfb0d2b277c1636ee27f9afd4b545c27c5d4e30ff64f8cd6cc7b11684401c59206149f46c61aaf64cda2b824da7099d94a0dd084dfbdf28ea32343eea7e96c8849160f9f89ccbf3938a1038c5583258d8e50a439350add139407608f8b1220bff69677"}, {0x60, 0x10e, 0x5, "cb61b1a44626109306e945997bf75eca29919484b63f02f2f2aafb2db2200ee4e46bda0590896c126f1b8970cd0839b73fafcbda431e84fc9517b5d3260f62519a162893a046d58578abdfee85eb4891"}, {0x40, 0x6, 0x200, "1e9288e18bff8637f614dd0683290a241f2854d06d611e6e89d8b6a93fa406a5d39a85969bc6cca502d1f0ef3594"}], 0x258}}, {{&(0x7f0000001480)=@nfc_llcp={0x27, 0x1, 0x1, 0x5, 0x20, 0xb3, "f505abeba1016df44b0f58c8cbc2c18c3faa7f6ea3c71ae7a3ee9c7417eb743955425610f5ed2a38493668ea93686cdc86f15f69ef68bc7d67007780c1fc1a", 0x1a}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001500)}, {&(0x7f0000001540)="368fa20612b6d0a116c332b1fa49549f7c849e2898b19487b0a55ff10dac536deb22e95970cc5e66d10fafa90d3f99469d69c5dd790b107bc064", 0x3a}, {&(0x7f0000001580)="1096eed1c43604f2e7c7dc6131357439c8562dfb5474618a75012e23ef0774b25af8f2741b36295dd009571ed4a4e483a1ed5d06f29e45a5d491dfe61b1c37dd3361737a9661d887ce284aa78c09e2521cc91ba8505a8b764dc8622d8de3f444912155c15fe37d52b8ef5dcff07ae6ba351ac95b8ac6bb9385d3ff05cc0ea6df7330d0055bc544e00699fe31e444d82e21c40300cb2589a168a2eca8cb98492505a628696d264e6c6141c85cf93a756d683ef7c414419346a1311b662920eb4a7f117e0d507749bc321e4d2640f85b0143fbf47f3755340d265616683073967e9c01787aec1e7773a58219676d97ed9430f04115d48e", 0xf6}, {&(0x7f0000001680)="dcfef09ecee9e2af43269c208f526cc9b04ab1ca41e33efe712579e4e5f5fa895eb04e4a5e9b0cff57bb7dc6b52505d19c11c229d84c0d2d5156bd9eaccaad14100c4a107ea01236c1fc41ea5d794b355dfdf25537a5a7aa3b9a2bb9462cb3cbedad473ca3bfb6782c2c6d4266821f16949de8a638c3e3ca7d69e6fc13b90185c429208429a315", 0x87}, {&(0x7f0000001740)="aae78a4df2899ab10589f518cafe9b85a172bde4b269df50a771894a7e01bb49999c92f12fa33993dcdd5f5e9f1e497e8012832feb4a92831831ce7ff4fde1eddca9f5abd16ba9e73046055f6835d8100e1d467cf5a7d320ba1a8c07b4c90ebeb50b7700b37cca1d3150d46233f2b4edecb34260ce839a70439fb6cd567ec459aef15a7fd10c7644bb6d05cf6163713f41bd17ed8eaaf9a1b636ff09cdca38a8b51c", 0xa2}, {&(0x7f0000001800)="cb2a757480fb58e4609fd3401bee4ed79a594cb7221be6f9619a3c78a6f71d970c7ae11bfaba8cdfac7c5e6507c8d6845bb11e61c1ff2eb63d980d5f61bd39137aa74edf7db0dd870ca52780e1a3f1f82045b88def1bea1ddbbdf1841d25718a0bdce3fdc569ad440335ce94492c2f21836880cc22c0d24b2c71151c024b44b3dab486dcb154db67471d6399f427083ff8066720bfd2a4f0c1730ade648fd5e8dba86173931888b50ec63c78", 0xac}], 0x6, &(0x7f0000001940)=[{0x18, 0x0, 0xfffffffe, "dd6bd46126"}, {0x90, 0x0, 0x6, "cd0f8adb951868566972e9c999fa67d91b1d5a1301aec20f4bf6697d1424369476896df085a1210328dc6ddb58504e73e17e90b807d320acf71fe1ae92014cc9beb8e00a50f81e03e192a6e71679f5e6d81ac05e9361f35ab4c0b94e0faf17eaa2af1107189ba4730b6a7feae49c3c22d2187ff45a35a034a5"}, {0x68, 0x109, 0x40, "b8c2722af5993d18bddcdfc823ed3607a9c3943208e2663c28186e327b8f31e7d3859b1727f47b657ce305ff77b9f2c378657f815ad603c8677d87c69dce622ffe0fa088fcc280700b5493748aa60077471fd496ee0d59"}, {0x10, 0x10f, 0x6}, {0x90, 0x10f, 0x3, "b1702402ef5712ca567038a956b8e36d1ea75029b8138f61de4d778e4971bbe5c367ab1ccdc4bca2e9455048283918b0589c2fde42edf95593642837fd092117825232639b560ccaea5823733bc0862683f09cd634fc7bf3ccb23a6db647ca5b8874c4570a0475e82113e37a494a6ca9d3c5cd03bf61e48ecbf85f70"}], 0x1b0}}, {{&(0x7f0000001b00)=@nfc={0x27, 0x1, 0x0, 0x1}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b80)="e099d55b99e8ad730765cf182edc3c0483ece89f769496fd1d7cb2083edb84df431ce0e92afd4c3689b3abab22874e7fe0007c3221ae0744285f64657e81c847d3169de31cd5327ea5159426fe8c9b4378b7ef6779735df717f9baf56c49f26f67658d23de28449f912c5eaf772c63a89c3790018d504b7b30954b46ba503211db7b4b2392f87ba2e455833aa99b6d6bee44e8bafecb6ab0b9d9495c5bd3250dbcc3090a0423ed18fb8cbb3600bfb32ac8a1b607f840c0b218e754fbf597ecccfc777a9d9710580d598b04efc4fefcb78b21f9d1b12e27dfc0976b124f5a70725bde5b0add7d74b1", 0xe8}], 0x1, &(0x7f0000001cc0)=[{0x110, 0x118, 0x39e4, "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"}, {0xd0, 0x116, 0x0, "abd70494ad6d737eb66b7df69814dd7d1973d8281a98ddf15c2e3cd1c8c900d9e6f5618af325c073b455c53be2072c844a4328786209d0d77b35b7bc64762733220605f03c0b559fda3f647e04283a24ca0eaab14281d74b4bf1ca0e4d7a3cc0970252d4126f34341ac376205663a75ac74a9e42231d3c8f4eb689e85c83b05236d1e384976cd651db0fba6fc97630dee0e9c0e67f338537f48ee5968b8601c59caf2d40f2f659d9050ebed1f1de371c1335fadfba1e9866eeb8fe23cf"}, {0x1010, 0x10e, 0x3f, "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"}, {0x1010, 0x100, 0x400, "e17f308b5472e809811bacd50fbeea790de2c1aa4d8b5202c9247e74e5474fe4b9ea2837a75b6e6a22f333527909435496405198e1b9a163981b0057ea5f0fad0a4f0c595d1720dcf95610c1ca3aef5e49aecdb463e66a84603a838d0fd6d8e2a16f3ce9733bd82389f287988c9f4994f66ece02f1a37cf338bc1916b9f6da3b3df6816af8663bee15f53bfc772b31ca910c93e036c5f8eada57f97edc36336d8f9a5135186aea2547ee2a5559060742fb82aa5a32b84af6eb3f727099111e38b9fdad20d3ee6b8ef0c442e965a34e93b1584ff6202aae701974c9a9c902cfad146b7c662576b6853b7ae6d481d5087b28a63baa1f9b64d7d54c97fc268be1a525a9af4999034c26ceac13a430a20029b0531dba553fdeaaa448fd9cf4e3769260dc454787dd32d39c33a3ce344238d6056e1b7151a199883a6ed4c9497a23cfdc635ef0ac71f64d7cdafc8a34356350fe72abd18d8adf2bd7960c1d267eeb9d01548d0486843add46f9fffebdf8c1e5de1de81094b1fef3ad47ef00d5d1dffa6cb44d76e22a3cf8cbd0f62af0a2fb86d5c1b0a5ea893da8318d9cab6e5b9c42d79eeff88c4893b79df011019fe830b49e732c006708f5bd9b31d57d80dc81022626ff4a2c53780c796ff31993d9089ce26a09f8d2ac2cba5aef4518abd7804b5bae10eccffb0aee407be4424630748ac909550bf6806cd29c41dfd24d92f6f2a02cae02ea36f2e1b948b37931113395eadc4e429bd2d7268c99b511feabb2efef8f2ea3395d6efb513f87c64abf02920e9ea14cb5de937a1e7c36f0e1a09193c16d01837dbe40c04219b3f01024b90d8a2df63090b965c28fd8792da7bf7145cf2ffd004376946147846b1cdb10f8f87fc2fedb8fd9860402c46ee5450ddd7acf07558f6b031b20e6e09968091825763abe4c2f30848dd513cb28e08a005006d5e21a0dbc0a6536fe414e67e55db9e5f1a55253dff6ccf3f1207d20d778cbd123da5c9f3b402b7fb022ca621dc9717770f428f0eda946b0c89285ad0f6d14459263d5015e0d9b42af96ecbc44dda21157ef8e47b2c7e5e5453af9c078799d03251b3e6d76e0a6b3c1c79638d854d5f2744a87e1bb342cdd202cb84d8a5049ed9297fc21310761c8ebce821ab44c3e63483f854fcee7cd88701be951c81a6c17fd8b04c7c36c63cff40550b7c6ea1bb939fd17201fe295150dda15d97bf1c9dfb639778f33dce0336ea27daad0a7e92198ede95240222139aa44205f0052a359d5c40a86b9c2ac2337a592a3287ee4e3e9ea78a631048b558fbaaae3e22de702d998aef8a127d109af10565c15ed504e7881b3a7989c353ccc0b5f74e6d0fabb397ea9d9d71ad313edf01f3b19995daaef0cebf1503933d9c69f229f34fcc4de2bbe6b0b1b2aa21181bebd764f0bf4ea064208bf8a9cb6cccf4c415a18e01f79af46e71a8f467f82d5563c99a9a92e3c76511ba5756c9e41e4964417155a57fb187494b3343341a54c14454c2692ed2c579c90cece5ec1bcb830e72ef235979a12592c544ad9d50e03555d2f813ca536205296fa472f3e0010d3d79e4abcdcbce6e800025711c34f5ec15347ebae87b4bc057c13620b036ccd24b47b558397d9b1c79123afaf1e7378310a6b1e03e5b2f77610bf644d3ccb9f6e967443b911a550ea6ef66471c5ce6e42aabb089c3a7130d0c93fb206e961e2293efe1c8732207d7582f71e2cfe7cc038273a85dfc9797e385a39b25e1ed5d85bd66449f6132db1449b57f46b5a19ba60072cb85972ff9c78ed9c8fa8ffb5dda99f4776a011c9cc2150c5c9f0d2b40d1eb427b8d2c5101f019ac7115c3970a353771312757a5217d3f157e5a1ec4e63aff862e086d1c7f04165815d7ae30938d1c155ba3ad87f902d9defdc69a17152a4ec2b0b9446ef89a1a0de1c30be1b48fd16d5a91e40ca515fc00ddbede2ffc8a70cb0f21fae51076ec9bb3784eee47c170ede98349c1a4cb827ae1ac3d4ee3b503e69c794e6df1937165f0b7d378e8e6182d3868b1ae23dfb3dd42cc71c31d1f0265c5f5f734aa2680b8dd8fa87d3a8841c26add27cf1aba75ffc1b923958045fd30ea506a8cb0d67c7c3193f65a8c0e197278d29389e3d88be13fc5f82567b6bfefee32ddafc182aebcc5b7fc1ead46543e95a9f5c4c984b718ec360b2afc53405b535c7ee894b7fc9e862ff2c9fc06d939af7b28dff8fc8da72e1e56f2761c28f90ac6f1f6a5e02c44291197ab2ed864f2c5ea465fd865b4c80acff8c64c8f6481160ae24dfc299ed288b923670be94ff040b2b0ef63671bc2f249cb394728596c07ed75bb71c6c05357a792fc7950dbe210a4a1bc6c69b21fdee782a3bf9c16334708561f4b7dc87f50ddc808d1e227e319e5f2ef939458b6138e18b3be3eb90040f2bc13b35d3f685036ac82d04a88e70183b1c5a33a26a629e9c4ae594fbcc07d5348638f628bac2081eff067cb8db29913ddf5a929e8b777237b2dddacb4db62b72db2f154e482260382b21c411df42b8f4d22ae786204f3d214d2f2d7f204c8695118c1c618a2395acc295d80332223c68e76cffce77e714607bedd7e7a71979c12c0b37e9018dd000ba47823827d887c09dd1aef959b9aeec323413f4b30786d1a3017574f8db29abb56a0e673ebfb17178f000135fb6185e47448f72bbb7d6d13b2df8d039cd8b5e0c56e8e998a835f929728b0ec4ebd666c792768e6f9fa8dc120b072b1d7f78d281620dbb161d6e4905f12155cb635fae4ed3310b4e8ac5e54eb89ada23a892f6fcd439fac1392350f5129bf5e1d173e56990d411598190c78d23c8fc5ea2e68d80c6fda3d9643c714fd2f01dd7d586dc0d3a57bb21a2be781df891a9fe96f5aac6403e5d9ed3424555182b532274ea7d69fc12ea6d3fa22b3f7593f313f94ac5f5f6b449a5cd1e0286bd347c5ea6b5cf05c6f5ac12d828e533f5d4c79190267a093ccf6f0f3543b1606a93f6fdfdec525636b280360a0561bdb5fb99c6b5396fd6079956de0da7e21e3b4ce603bb3cdc5a7b9f131c7386a0fbc370cafcc1b545fd07b1230db36964d1cbf6d2421ab2fb856e19777a451855638774505055045019b519c6bacd430dd9986754acc97e0437495955cc77cb9328c88b0e7d56f6951f0c67310f5ab6d4db852a56094844458b6e59d0ba40117e07127fa02b5b4ba2adff9d923363cbab8e53beeafa4c1a10c87a8860d74aea9e6506af7813e4b106692b5cd5ecc002ed71563d1d0b367780e5aa2ccf61aefe03818bec21d926deb2aa6ea4a05b867abe857217fe55b29594aa8af180517a02a43a7de6ee3f66c5b4d6817ed0d6a415073fc6935f3e03c8d957e3071d263aa81ee176b8db185e3617741a4792c3eefed88ca43b1ce904d7869e0386baa365a2b96f3b9dd60a9868fe72337fd13559db6e0dfb92e7b111223133d5ef593c8774966f09b5f760131b6d4308a640500205b6261281ce09fe4137852caaccce409fe70f4f0d5f2fd675336f45b197147ee9448429dceac596b43dd9af7f22e8e62bf202d355632395a7519c7358f279ef3a3af09220448b01c21334248d0d31db40deb6967fdc69721f9c73d6359e7e4693f08f865b7adb7293ffda9b37aa60b2a550a50b3061c59e2d74551ea4ed0984fef4161c81cef24c0c48437e80fe21eb4e08e14e6f75a03c40165aa72dcbe48eeb52772b9bbdc4c543d2ee2d3ca073941c3300d07091f633ad8f199640a6f16880fd370ccadb5003dba0138605b5d1651a3d4d1f974f1633c9cc7d534d2b87c1672977a3b7fb7cbf676dc467df91aa5d3e0f64e1c22378d88b2b6e0345ff8e8039d50003ffb2f54c6671a3f589dc4b5664c26b22ab4783426d173e1f8389d97523bd235b36101b6bb2cfaf0e58cd0a9b1fe507f5f3d8ac7bdcb2458ad28dd5524afdbdf8a6987ed6912dbfb5ead23792449dc265e270998f52dbc84dea47da75e919771eea2ba6e87756e6cd2b01164adabbb91a95d9d1d108b20c41cc4605168680d5d0623aaa0ae3b8e3afef5f2e1a02050796bdac293eeeb948e111b362ed96dd5ba03869c2ba4d0990e2080515cf2c505826a3aea275ccadfe4b03286175818e893eed7cc86eb4933a4666a254f06c0289242ea3012eb6860fb826603c4c239fb0651eed02abc873566ed39fa68a65a2a65d92f66241743dee4338b535c0657dd6f841002741b1e30e76216b39369e1a4bb9df18112c64da8ceb884ccb4a2ef067a63f944b5ac90c1bc4d926ee7c2f92f8c03240a8846a24032edf8e26e60a2ce09adca4eaceac108834e30f144ae8ba0672ef06ab9944d43565f63ad53d486bb04333eb6fdac6d807731ab8887a5df868847d1a011b1ce69b97643f80ff8e5ee495055a6f860fe1618c63b52d300988542b3385d0515b802b3ba1684e6855f39827da48adec5123ddd5ee438fa2cc4d73db7da2dce257c1dfc581874ca9bfbcd7b4a17f213575a64935f663da06c62799baa0b31af5e209b2df34702652e5821f0af221ef0e77f9058fb6484b8a5404ed1fdbbe2a42c2221b833ab82d92dcddce411a56bca514636b2be4ab4a52f3664e478a3834d5d0cb7a4f1c12d4ba34d62715952f1bedcc776191a159b1e5887c10fff655c81427465f68f061e755a5a635b0bcaf0010f22f8ce2bf8aec65f66e0ea2bd557c75f91b13cd33728f4d1fe9bd0525e552120ae7c9be4141913900b38d5b8bb72edcf205f78afcf32eab3780549e949986b4ebcbf4f4656fda9fe49653d86eb1d54c39556c34193907782dc680fac3b15c617e1b36160ed9fa930618597b9873d800c71971c81dc8b978bb436b5e06238a53383d8e0ac797d1266579d76c8d725129e881e7167cfb7a61879bf7fbf44abefeaec6b8a13e628b2958ec18dcb61c5fdec7bfda17421836e267b0a526899e79784b530524884f875ae2350371f0bdcb885312af6e534521cbe07ca43cc352a6e8690a11e0f1700240bdbefa55b9975ed173db3087f2dda5d58438e12eecf80190887db4320797ec4df84c03c8a71ef1744ee172c498f54a52e3cc6650a3e5962e59089134396da92e676ba29d1d3711b7ec97d3520b0d8bbf2a6859ccf0d612f7e90dcad1b0ea705e3e2f4187df3c1df0d8eef9d4828b55e4ccc530307c587f825cc18950432d84f032333970016f4ba035b4802d51e41642feb65c8d67074e9fd8ce8c8b81a642177124c7e978073fa739d3d4f34a489760854a0fdcc7fdf9610b4a0e4bcba92c83e9dcc72b81c59c1a7fda025a098dcae11df114f3246408b002a594c85bd1bb0230db8b22c86580d0392b1986abd5f94716bae9a4f111f2412e9c47a5d22e4ce7f27a3744efde4889f21be9455018c3e7c3dcc8ec76a9a5d5cb796ae6d03e68fada7258bdec163ac3b3a401eeea3529c82ac68e1e1e63c406d8b90c5770e2483db83113f088d8bb67f9d358ad470d28de048f8137cc3924dd2e4e2975abbcf2133b3a675021b9eb393d4876ba339740160474e0fd37df4d0f1f65d1b95e6ff14b52da68ee86f9ce799d708ebdc2d37aa3d9f0395e5654825588ff73c26ee21d17f58c12e74495e441a4d058897fb0517a97c6c35b83febb2b732ec8396225e77cf6d9227d8d9d4932b6777e2785d3225a4a6ad78bdcde261a35b5f010330320d0f9766cac66fc65cfc9736eb291144a76469b39924653b8b90dc836e01e7dfb5ec0ed277617423adac316b3c3a14d8fd483ea762b8faedcf64fabbd28a8dc411cd4dbb87f08d5876c94a590adff0720d0ab7f98e1"}, {0xa0, 0x110, 0xfffffffb, "0cfe2e387edbeaec17188727609c91ae28b95d6ed7422ec124720ab44a1e494ee59cfee43acf2a0b98b95ed51b525192774c1d695348224974b7f27b7e521fe53962083c871b29549bf092296aafa8c1d418b92a0bd41c2727822fa4c72b6c01e20f7b8d5695670b6fed5c517ecffaa1477f4f5802be568ccd4f6ea20873ef0e90aad94ea298a1ef941a6c024bc5b709"}, {0x108, 0x101, 0x7, "40c7c25409c3558e83dbd8fb277f5ccfb5e241f44a461f875503d4b4b59c3e9d56ffef58d42bbc9b0d85b29a86faf28ce2bb8028b6dd80a8cfcaee7411a34524d1627e6dced179b04a15f7f02bc85cd15105c6b572bd5f0de8cedde411858912296eeb7fba0a50ab37a26146dc36c8b1303f745f37b9a7c6e7d3298fce2b1ab4602dfa8ee978a1a3f1a15eb58bb7b4405b500562e13111c165eb5be374ffd6112445a659bb4c6ce9a4da566a82e6fc18b8e166b47be80ffff0275aeadf2f2c55fde99a4cf7e57a062ca9b3e48f8420fbdadcebd5544a067190b35a90ba453abd16d1fd3bc10edd82e69f7abbaa90ca16c629d5a0"}, {0xc8, 0x107, 0x1, "0ef9eb2661bab6035c8ea9169098a587bd1682fe8a95cfad9c45c7e2312d7d7d075b4278512412613bab993d486998f7400ef6df7fa0aa4ec3825f6908b156b16d20551b1da51032d459ca4d578bbd4359bda3f8e7528f281be387d6f2d61746fd11c16239cad543b6d67a9435da49e04ffd80dbff00c93150ece5c9e8b4ff954491e7115ef15b967a94ed5eea6ccaa9ee316724cf471ebdfb8b191c310c9282075ffd83f8e1a4fd05ec7ae4f4316be094"}], 0x2470}}, {{&(0x7f0000004140)=@ethernet={0x306, @random="36bcf909fdb5"}, 0x80, &(0x7f0000005400)=[{&(0x7f00000041c0)="87e63e386f0345d6f747b47d5d862bfb209fd77403ece1a5b4f62baf24fb35233ae70556cb82849b52ff999331244fcd395bfbeb3ae79d051e47bc92447bf585ed681b40", 0x44}, {&(0x7f0000004240)="d681a2a12356d50a7c8b1b16b9b5eaacbfcc09ecba4a29f696b2bc18d31e779838ec6a64adc0474cc65ae18a049cfb9ff66646afb1ff536fae3af99cd10201aaa0eacbda23a0e1d5afc474fc63692365ab64379985654df015e4b69fbe60d11a557315b3f403578310f5cb0cda4e48eb76887ea6fd7034d42c85cd5d7198636eaff122264d683a14cfdb3f495fdcd2fb0f10cebf93e6919d18976e46a1100d5dd4ee535965c4386b9e030bedbb57c9", 0xaf}, {&(0x7f0000004300)="f3bdea8e5100b8ca372f8de4cd12f2c2bb2df455a25792eb4ece1162fed170f1aba8e177eb6fa39cc39079d2b9779959f4527bb487dc6634fb4cf0b1aff784716423de398bdf9b392200d541a46a830236009df9f9f7de95ed59439bfcd1de03d69f8abda2cdf0f69147bf6c9a7a30e0c8e4c9a6207e419d234dcc2eae32de72a98135abfb095ba3dcc72a7f58a52fc07c0cd986a00875c13f83735784e75bafe4b700845b98d80c531e12f302c8ec687aba970ffa1d9eb22a7e81ef8d4e985dcf572b452769e54ca1644922b7e1e2b79775867c10de23ef082cc67a49b9201d1177426b0e4a47a4350a97b667903f69cd71b87b38", 0xf5}, {&(0x7f0000004400)="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", 0x1000}], 0x4, &(0x7f0000005440)=[{0x48, 0x2, 0xb92, "f8259ad1b3fbe8287e6366ec87f05e863508069cf1239cdae1f9c1bffea4f595e7c592803eb44ac4b03354a0323f84f680c8bebf049eb8e6"}, {0x18, 0x101, 0x7, "1c46a93b45a51e"}, {0x108, 0x107, 0x7f, "6c3a4f150b44d361b37b6dfac2b185415173c16aceb8195e680d01f6b959797579181074ece9eaf19a4499b30e47280e10d525aeebbdd7649578dd081773925d2b720cb6d5dd6a4eed792f69702dfb167d941e4df6583afb52c99892ab52a7e86a117de6b2d5a8c3cbf8e47958e4c6ad4f1c6914d74dcb9e32f77c41aed41b575a2c8a59e06973730da32cf9253dbfcaa07324a1b45e112493e78279b5fdc50ac03d58ac07f334b338281d089e18e54c21fbf5f131c3301870abcad6a9e4178dfb4bf72515a9019acc2c977e31acbbbaba686a8f48459e6913430a65e102d203560a0e33e1614b251eca2af893bcd79c71487e6077ed"}], 0x168}}, {{&(0x7f00000055c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000005840)=[{&(0x7f0000005640)="8f9c93f515c66849208daca3ace0b149f41420f3c125bbb0b73ed743c4143621fc977de2951c9c3db04e249bfb2f3248f82fa2dfb86c3f2e295954b0ea27651ece3db5c6d4e1bdf5cd7b9ea8959ec0ef9bd4347c0575f29feaed93dbfd4989fb6bf022f50abfc936fbc85e4187f17cb402e82886bbe70e798991fa070de9a5979f5b0ead06a30c8ea0d47155a1c4dff93dbcb482c5fdc54e580f39699dfb05e5f4354763027f25e3ab0e52dd547caf72e0595c3f2600fd5ecbec7caf744a8cb6e792ab2692b139d16c43a4c94e1e1389fca8d1c4a08ac120e768ea07a5109b5bd6bdd8b4d00aa4780abce6ca1788987ced", 0xf1}, {&(0x7f0000005740)="8e70693c4b32f407153f30c96b50b4e7b39c60b1e354adbe3b6506c178c4a59a9206ea042302876d63aa85a7df", 0x2d}, {&(0x7f0000005780)="7300d9057468712be3f753ba177c5f3ca299ba54243311ce49d595c1fd6a36bf2661a885d447f1cbaa515935a801b8ccf5cb4df845e387e27cf6523c5c9597e60246c7666154bb4bf45bb196fd62a97c6f8038e24770b4472c798bc14eb6f770aecaf7e39e387db7df717e1d75a872813f64cf7f9b56a94fc0f0b25928a62ce27ddc7a5a6ca60591a4994ecf7d87e0990aebea376092c028861747a85759b14105d45019c7e0c3ca7b127c843228417f42e90b", 0xb3}], 0x3, &(0x7f0000005880)=[{0x1010, 0x1, 0x6, "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"}, {0x28, 0x111, 0x7fffffff, "bf92adeda5e9dd0d30bb6d226e0017398b055a"}, {0x60, 0x112, 0x5, "6f41cb3f435d56fb764ea52241ac4e72379b87c97b0f83153e9a8d6dcca9ebb336f84d5046be85c966328a81d4450ffac0c8a0d0bd7b30063f62168c13ead1d699991f250e806b0741ebecbce6c2eef1"}, {0x108, 0x104, 0x0, "bb521e0f0ad590dbfa550c6676e6f3a230292a13b41db28b79a7cf7dafb76d881c2dfe2e53111eb9349c737ed8019c9307219d367b7cb8fb3fdcc5123f992e7efd6bd7f77c7f90ed7541baa40f5731b5b92171703c0333ca1448fb52a0a20900b33dd701bcab26afb8c6066cb0a346bbfe3485e7c90d2d4eeffe70327bd7c791ee136699b4c85ad186e187ae54a2553103858fd103873896d64565eead4e65fd179e63e72cda0e766a86fa8e292564b068b267b924acc877e1c158bc254c0f2931df1005741eed90d390c1e68f874d9a8366923a300e32bf2061b027ffc538a548576a8120798e87b3b1221e8a9759c96c514ab18728714b"}], 0x11a0}}], 0x5, 0x4c004) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) 21:14:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:04 executing program 2: syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f0000000040)='./file1\x00', 0x9, 0x0, 0x0, 0x104080, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x11) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="080a27bd7000fddbdf25110000000800090000000000080006ecffffff"], 0x24}, 0x1, 0x0, 0x0, 0x38b46acb87e3ce86}, 0x240010c0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x100, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40004) clock_nanosleep(0x5, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0)) 21:14:04 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2011.055484] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2011.099535] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2011.102515] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2011.130554] Dev loop3: unable to read RDB block 1 [ 2011.131299] loop3: unable to read partition table [ 2011.132507] loop3: partition table beyond EOD, truncated 21:14:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2011.132675] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2011.261257] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:14:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff00]}) [ 2011.779319] Dev loop3: unable to read RDB block 1 [ 2011.779464] loop3: unable to read partition table [ 2011.780023] loop3: partition table beyond EOD, truncated [ 2011.780093] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2011.892730] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2011.901213] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2011.922738] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:14:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:05 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10082, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000240)=0x80) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0x14, 0x2, 0x70bd27, 0x25dfdbfb, {0x15, 0x2}, [@INET_DIAG_REQ_BYTECODE={0x60, 0x1, "5c5c8e1bf3a49a9afcb2418cbb884d0620ba762542a4afe778f6f7af2c64d12f6e6d8314c1a332ec76a589c4782b8b694c98aacdf3c5dacb9d10be1a0874d371371c872b4f4af7ca5c4df2a213ff22028df248576157bf41a309c9c5"}, @INET_DIAG_REQ_BYTECODE={0x48, 0x1, "e6b8282685e1ae3ddcd79d43d20d54e0568a52fb41eafc3e68a68ce0756edd3f7ab597324633b053959bba20f753b049a006c5e1967ec7d8aab369e5461b36c23617c9c1"}]}, 0xbc}, 0x1, 0x0, 0x0, 0x11}, 0x100040c5) [ 2012.198611] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2012.230657] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2012.305196] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2012.353328] Dev loop3: unable to read RDB block 1 [ 2012.353951] loop3: unable to read partition table [ 2012.354627] loop3: partition table beyond EOD, truncated [ 2012.354764] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2012.390993] loop4: p1 < > p2 p3 < p5 p6 > p4 21:14:06 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) syz_mount_image$afs(&(0x7f0000000080)='afs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="f935064d", 0x4, 0x7ff}], 0x5307a1fdf7c7d108, &(0x7f0000000180)=ANY=[@ANYBLOB='flock=openafs,flocC=stryctl,a%dit,dont\a\x00\x00\x00\x00\x00\x00\x00Ch']) [ 2012.423149] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2012.492478] Dev loop0: unable to read RDB block 1 21:14:06 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2012.492594] loop0: unable to read partition table [ 2012.493268] loop0: partition table beyond EOD, truncated [ 2012.493340] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2012.662460] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 2012.666937] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2012.734080] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 2012.885104] Dev loop3: unable to read RDB block 1 21:14:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff01]}) 21:14:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2012.957468] loop3: unable to read partition table [ 2012.964767] loop3: partition table beyond EOD, truncated [ 2012.972449] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2013.012597] Dev loop3: unable to read RDB block 1 [ 2013.017766] loop3: unable to read partition table [ 2013.022788] loop3: partition table beyond EOD, truncated 21:14:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2013.048552] Dev loop0: unable to read RDB block 1 [ 2013.048683] loop0: unable to read partition table [ 2013.048926] loop0: partition table beyond EOD, truncated [ 2013.048957] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x40000]}) [ 2013.309606] loop1: p1 < > p2 p3 < p5 p6 > p4 21:14:06 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x129281, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) r3 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{0x8, 0x0, r4}]}, 0x2c, 0x0) write$FUSE_ATTR(r0, &(0x7f00000000c0)={0x78, 0xfffffffffffffffe, 0x1, {0xfffffffffffffffe, 0x8, 0x0, {0x2, 0x6, 0x9c8a, 0x400, 0x40, 0x4, 0x3, 0x200, 0x7, 0x6e, 0x9, r2, r4, 0x6db7, 0x4}}}, 0x78) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x288080, 0x0) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvme-fabrics\x00', 0xa0000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) bind$vsock_stream(r5, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 2013.430263] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:14:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:07 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2013.580158] Dev loop3: unable to read RDB block 1 [ 2013.580576] loop3: unable to read partition table [ 2013.581239] loop3: partition table beyond EOD, truncated [ 2013.581283] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2013.696213] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2013.700935] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2013.753459] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2013.760922] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2013.783360] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2013.923526] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2014.083414] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:14:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:07 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x851, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10d000, 0x0) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 21:14:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2014.123100] Dev loop3: unable to read RDB block 1 [ 2014.125370] loop3: unable to read partition table [ 2014.130727] loop3: partition table beyond EOD, truncated [ 2014.130841] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4000000]}) [ 2014.458342] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2014.509076] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 2014.526863] Dev loop3: unable to read RDB block 1 [ 2014.562410] loop3: unable to read partition table [ 2014.603595] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 2014.616694] loop3: partition table beyond EOD, truncated [ 2014.637364] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:14:08 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f00000000c0)='\'!}]-\x00', &(0x7f0000000100)='bfs\x00'], &(0x7f00000003c0)=[&(0x7f0000000180)='bfs\x00', &(0x7f00000001c0)='}{\x00', &(0x7f0000000200)='bfs\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='bfs\x00', &(0x7f00000002c0)='bfs\x00', &(0x7f0000000300)='bfs\x00', &(0x7f0000000340)='/*\xb8(/%+]\x00', &(0x7f0000000380)='bfs\x00']) 21:14:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2014.650052] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2014.704268] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2014.712860] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2014.805506] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2014.874584] Dev loop0: unable to read RDB block 1 21:14:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:08 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2014.874866] loop0: unable to read partition table [ 2014.875409] loop0: partition table beyond EOD, truncated [ 2014.876086] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2015.032724] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2015.151003] Dev loop3: unable to read RDB block 1 21:14:08 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd044, 0x0) rt_sigprocmask(0x1, &(0x7f00000000c0)={[0x1]}, &(0x7f0000000100), 0x8) socket$inet6_sctp(0xa, 0x1, 0x84) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0xa, &(0x7f00000007c0)=[{&(0x7f0000000180)="8b64c38da1ce1f2e2c5836066a8a15d807442ade33974181bdf00ed0411490af7830b51efe7e422140941dd55368555f661526653837d312e453e8870dbf6217ec350b772c5428e287d4741a4821d3aaad25afd9bd5d83e34c9d3236afd5dd1bbc7ad247b2a6f40436af95a44de3bbc5747636a728d0150964e5b65c5497a062b61f0e78a362af68efb3e6485ce5685b77c5f74fe8643e6eed3df60c9dbf5f597678f5588e785e3c98fbbce08199e28ad305134a588ba3", 0xb7, 0x5}, {&(0x7f0000000240)="8ca64b6b9453d54c261092f4b42f03d19cd8c13c23fb4f85effe1a796887cd8d01e0afa8a5cbe03c1c7099f1cb452b9621e368f62cd81249a27c0d658ffc502413ec0a67034f4abd55d5c596eb2ad43b838f5fabd65b0416f90796872245ad478f67ff07c7abd99b01b6164292fb3c37bcac569f566feeb0aca0ae09428bf89b9b45da8674585c158d311fbc759d27153b2716edc544d1f2d8c2d672c46a15aff5015d4d653329b2afdbf23114e4e3c743fe4107a7897377da872a422b10c0bed199b908162035b5cd6ef648b478028412dcc8cb34e8e74dc5a5dd22a011bf7159d8166ce560", 0xe6, 0x2}, {&(0x7f0000000340)="11d4c4b9f364408fdba5171a825a288828b095265d55311ed44fdde8359da71f4683", 0x22, 0x3}, {&(0x7f0000000380)="b037eae7d0319213933aaee1593869327de6881cfba17ce9584056e65f0ce955fd7cebc9a571849aa5fe4b169a7859cf6afdb333942e8e2885c7a984fe7aeb31c8304383", 0x44, 0x80000000}, {&(0x7f0000000400)="9176bb7afe74070a9ebd6219412e3562484c45771aa39a894c20a443c7fdb288f5c0965f078f266712a44311a87f4f382fc4f12e0eb3f692f300b83799ccc78bda7a6613f121051a0d792ff52a87fc4587", 0x51, 0x5}, {&(0x7f0000000480)="010155f97477bb2ff726a607b5991a1b48177e79151e38afdf6e4e5709c7b2c2decfc138649bfe12d343613d0f2f4d7a523ce832931b06fdc646a2bda035147cebddd2e6b2e0766d368842819a1b5032efccd60b6c5b9bd38bd846a464e64d1a540374de2307e0048f8089a7609fda9bb67aeef8fc9525a750875196bc557659f1ae1aa9b79acd5f546578ce5cb884c46152053488881e1cadc3b15a0d2f056f15c8400e126df5f093cec17eee41d67864aadb07c92456db758cc64069fc8f8073268af01a22ddde08142d81", 0xcc}, {&(0x7f0000000580)="3b64ab66a8b4ced2df01839d8bf60ef567259489b63c7f0eaf84e3798d7d1dd4f4ba282c7362367e7d0df9b78c3c522676849187040d320434cb214aaf5efd3d8db620cd5a85661456b35647", 0x4c, 0x5}, {&(0x7f0000000600)="f8be2438ca64e43ae76f387bf7d6738cb2ebd818155315d206bf3fbd51982894795363f970546d7c284590d0c19a2ab1217d15c0fbba5b2146925e008c94dd0515a4eaac0efb72d3dd95cecc06f8f000d0ac397867d66c067dfc3b", 0x5b, 0x29fb2a2f}, {&(0x7f0000000680)="5f9c0e1c7c0383df62aafe0eef2f0a8fe8df13ac4c8a029b5be5de4f3a82128f4243ccac8e5c4be538f7eefdd5d77ff868d511070a783e15b5aa7d8e45a70aacc986f831fd5d7ecb470181eac85d12a96d5d31ae10f0374a867b45de028338d0933418cb191e94bc10a99304a26d473ff30794f465b44a21895a7abee91db07df2140456499f6c68a4b9f4cf5152aa1fd866ab96d00241058b68a9c31a1bc51be6dabd", 0xa3, 0x3}, {&(0x7f0000000740)="9428831566d818dbcddb6ff0b290a33b188c663f2b06751bed13386eb27c1f25da007ffcc3db88da482a47e6c93511e5e018a3bcc7b053763d8eaadc79a2b215b5f412390317c32496bb6590046a94ef13a4ef9ab57605b981cf3824facc7b58d272d9", 0x63, 0x7}], 0x200000, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) link(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='./file0\x00') gettid() 21:14:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2015.168208] loop3: unable to read partition table [ 2015.170340] loop3: partition table beyond EOD, truncated [ 2015.170411] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2015.441389] Dev loop0: unable to read RDB block 1 [ 2015.441746] loop0: unable to read partition table [ 2015.443465] loop0: partition table beyond EOD, truncated [ 2015.443651] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x10000000]}) [ 2015.531701] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2015.544257] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:14:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2015.623873] Dev loop3: unable to read RDB block 1 [ 2015.632856] loop3: unable to read partition table [ 2015.649344] loop3: partition table beyond EOD, truncated [ 2015.649797] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2015.662123] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:09 executing program 2: connect$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, @fixed, 0xfe}, 0xa) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r0 = syz_open_procfs(0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000140)={0x4, 0x8, 0x7}) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$SIOCPNENABLEPIPE(r1, 0x89ed, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000080)=0x4) 21:14:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:09 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2015.721488] Dev loop3: unable to read RDB block 1 [ 2015.721516] loop3: unable to read partition table [ 2015.721570] loop3: partition table beyond EOD, truncated [ 2015.873222] Dev loop0: unable to read RDB block 1 [ 2015.873521] loop0: unable to read partition table [ 2015.874091] loop0: partition table beyond EOD, truncated [ 2015.874216] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000004c0)={0x5, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 2015.980871] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2016.028881] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:14:09 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2016.143260] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2016.226421] Dev loop3: unable to read RDB block 1 21:14:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x20000000]}) [ 2016.226487] loop3: unable to read partition table [ 2016.226553] loop3: partition table beyond EOD, truncated [ 2016.226567] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:10 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r1, 0x0, 0x80, 0x4}}}, 0x90) r2 = getuid() mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='fuseblk\x00', 0x184a480, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1100}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1}}], [{@measure='measure'}, {@hash='hash'}]}}) [ 2016.671235] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2016.687528] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2016.706882] Dev loop3: unable to read RDB block 1 [ 2016.706908] loop3: unable to read partition table [ 2016.706962] loop3: partition table beyond EOD, truncated [ 2016.719502] Dev loop3: unable to read RDB block 1 21:14:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2016.719718] loop3: unable to read partition table [ 2016.720429] loop3: partition table beyond EOD, truncated [ 2016.720628] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2016.733211] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2016.739606] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2016.800247] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2016.999125] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2017.049068] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2017.111614] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:14:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:10 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:10 executing program 2: socket$nl_sock_diag(0x10, 0x3, 0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) 21:14:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2017.177734] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2017.220764] Dev loop3: unable to read RDB block 1 [ 2017.220874] loop3: unable to read partition table [ 2017.221147] loop3: partition table beyond EOD, truncated [ 2017.221164] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2017.243882] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2017.245021] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2017.253983] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2017.653270] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2017.701406] Dev loop3: unable to read RDB block 1 [ 2017.713867] loop3: unable to read partition table 21:14:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x40000000]}) [ 2017.727504] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2017.741364] loop3: partition table beyond EOD, truncated [ 2017.753863] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2017.813963] loop1: p1 < > p2 p3 < p5 p6 > p4 21:14:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2017.942577] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2017.966726] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:14:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2018.086219] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2018.104627] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2018.131048] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2018.132934] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:14:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2018.138220] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2018.206077] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:14:11 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2018.314078] Dev loop3: unable to read RDB block 1 [ 2018.314658] loop3: unable to read partition table [ 2018.316120] loop3: partition table beyond EOD, truncated 21:14:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2018.316254] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2018.413119] loop4: p5 size 1073741824 extends beyond EOD, truncated 21:14:11 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x104402, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000100)=0x76b6) r2 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRES64=r4, @ANYRES16=r3], 0xd0}, 0x1, 0x0, 0x0, 0x8090}, 0x44) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r3, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4c082}, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x40}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) 21:14:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff000000]}) [ 2018.691200] Dev loop0: unable to read RDB block 1 [ 2018.704597] loop0: unable to read partition table [ 2018.725923] loop0: partition table beyond EOD, truncated [ 2018.732601] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2018.760301] Dev loop3: unable to read RDB block 1 [ 2018.765348] loop3: unable to read partition table [ 2018.770348] loop3: partition table beyond EOD, truncated 21:14:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:12 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1298065, 0x0) r0 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6, 0x4010, r0, 0x81) [ 2018.802690] Dev loop3: unable to read RDB block 1 [ 2018.802787] loop3: unable to read partition table [ 2018.803053] loop3: partition table beyond EOD, truncated [ 2018.803108] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2018.876599] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2018.911065] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2019.094937] loop1: p5 size 1073741824 extends beyond EOD, truncated 21:14:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:12 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0)={{0x1d, @dev={0xac, 0x14, 0x14, 0x3b}, 0x4e20, 0x3, 'wlc\x00', 0x0, 0xf1, 0x39}, {@private=0xa010102, 0x4e23, 0x0, 0x6, 0x4, 0x10001}}, 0x44) delete_module(&(0x7f0000000140)='/dev/fuse\x00', 0x900) [ 2019.164919] loop4: p1 < > p2 p3 < p5 p6 > p4 21:14:12 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2019.221129] Dev loop3: unable to read RDB block 1 [ 2019.221628] loop3: unable to read partition table [ 2019.222491] loop3: partition table beyond EOD, truncated [ 2019.222662] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2019.298580] loop4: p2 size 1073741824 extends beyond EOD, truncated 21:14:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2019.419261] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2019.464947] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2019.510298] loop0: p2 size 1073741824 extends beyond EOD, truncated 21:14:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2019.641514] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2019.659228] Dev loop3: unable to read RDB block 1 [ 2019.660202] loop3: unable to read partition table [ 2019.662368] loop3: partition table beyond EOD, truncated [ 2019.662625] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2020.086817] loop0: p1 < > p2 p3 < p5 p6 > p4 21:14:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff010000]}) 21:14:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() write$FUSE_ENTRY(r2, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r3, 0x0, 0x80, 0x4}}}, 0x90) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{0x8, 0x0, r5}]}, 0x2c, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={r1, r3, r5}, 0xc) r6 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r6, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000000080)={0x4, [0x5, 0x4, 0x3, 0x2]}, &(0x7f00000000c0)=0xc) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 2020.126922] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2020.138667] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2020.149104] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2020.177200] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2020.220612] Dev loop3: unable to read RDB block 1 21:14:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000500)={'syz'}, 0x0, 0x0, r0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000180)={0x0, {{0x2, 0x4e22, @private=0xa010102}}, 0x0, 0x2, [{{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e23, @private=0xa010100}}]}, 0x190) keyctl$revoke(0x3, r0) keyctl$describe(0x6, r0, &(0x7f0000000080)=""/236, 0xec) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 2020.241392] loop4: p1 < > p2 p3 < p5 p6 > p4 21:14:14 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2020.258711] loop3: unable to read partition table 21:14:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2020.259121] loop3: partition table beyond EOD, truncated [ 2020.259145] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2020.261387] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2020.269349] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2020.641111] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2020.702477] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2020.762478] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2020.892419] loop0: p5 size 1073741824 extends beyond EOD, truncated 21:14:14 executing program 2: syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x3a807c, 0x0) 21:14:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000100)=0x76b2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0x0, 0x200}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x1}) [ 2021.005744] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 2021.006952] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 2021.009675] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 2021.030012] Dev loop3: unable to read RDB block 1 [ 2021.032884] loop3: unable to read partition table [ 2021.042746] loop3: partition table beyond EOD, truncated [ 2021.043024] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2021.337121] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2021.404185] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2021.466232] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2021.486096] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:14:14 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x9c9c55, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) [ 2021.502356] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2021.522998] Dev loop3: unable to read RDB block 1 21:14:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2021.523029] loop3: unable to read partition table [ 2021.526200] loop3: partition table beyond EOD, truncated [ 2021.526317] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2021.600126] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2021.675696] Dev loop0: unable to read RDB block 1 [ 2021.675791] loop0: unable to read partition table [ 2021.676076] loop0: partition table beyond EOD, truncated 21:14:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2021.676129] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:15 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x1) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 2021.865010] Dev loop3: unable to read RDB block 1 [ 2021.865222] loop3: unable to read partition table [ 2021.867038] loop3: partition table beyond EOD, truncated [ 2021.867122] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2021.948872] Dev loop3: unable to read RDB block 1 [ 2021.954464] loop3: unable to read partition table [ 2021.967672] loop3: partition table beyond EOD, truncated 21:14:15 executing program 2: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000280)=[{0x4, 0xffff}, {0x0, 0x40}], 0x2) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000280)=""/123) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) r3 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)=@newqdisc={0x3c, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0xc, 0x2, [@TCA_GRED_LIMIT={0x8}]}}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001980)={'team0\x00', r6}) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{0x8, 0x0, r4}]}, 0x2c, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = geteuid() write$FUSE_ENTRY(r8, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r9, 0x0, 0x80, 0x4}}}, 0x90) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)={{0x3, r2, r4, r9, 0xee00, 0x3, 0x2}, 0x80000001, 0x1}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) [ 2022.067425] Dev loop0: unable to read RDB block 1 [ 2022.072959] loop0: unable to read partition table [ 2022.073375] loop0: partition table beyond EOD, truncated [ 2022.073430] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x20) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000000)={0x7ff, 0x2, 0x7f, 0x1, 0x28000000, 0x20, 0x8}) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 21:14:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2022.350828] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2022.374342] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2022.468223] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2022.515300] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2022.551686] Dev loop0: unable to read RDB block 1 [ 2022.551745] loop0: unable to read partition table [ 2022.551862] loop0: partition table beyond EOD, truncated 21:14:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2022.552071] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2022.578819] Dev loop0: unable to read RDB block 1 [ 2022.578847] loop0: unable to read partition table [ 2022.578907] loop0: partition table beyond EOD, truncated [ 2022.619810] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2022.657932] Dev loop3: unable to read RDB block 1 [ 2022.658313] loop3: unable to read partition table [ 2022.659185] loop3: partition table beyond EOD, truncated [ 2022.659351] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2022.718540] Dev loop3: unable to read RDB block 1 [ 2022.718569] loop3: unable to read partition table 21:14:16 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 2022.718639] loop3: partition table beyond EOD, truncated [ 2022.887843] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2023.030510] Dev loop0: unable to read RDB block 1 [ 2023.031591] loop0: unable to read partition table [ 2023.033980] loop0: partition table beyond EOD, truncated 21:14:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 2023.034488] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2023.167600] Dev loop3: unable to read RDB block 1 [ 2023.173465] loop3: unable to read partition table [ 2023.180609] loop3: partition table beyond EOD, truncated [ 2023.187825] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2023.195079] Dev loop3: unable to read RDB block 1 [ 2023.200610] loop3: unable to read partition table [ 2023.207596] loop3: partition table beyond EOD, truncated 21:14:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) r1 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:16 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0xff9c, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}}, 0xff3c}, 0x90) open(&(0x7f00000000c0)='./file0\x00', 0x4c000, 0x100) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) r7 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r7, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r7, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000180)=0x4) 21:14:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa30005000000"], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2023.451144] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2023.501873] loop1: p2 size 1073741824 extends beyond EOD, truncated 21:14:16 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r1, 0x0, 0x80, 0x4}}}, 0x90) write$P9_RREADDIR(r0, &(0x7f0000000080)={0x68, 0x29, 0x2, {0x7fffffff, [{{0x40, 0x0, 0x8}, 0x4, 0x1, 0x7, './file0'}, {{0x10, 0x4}, 0xfffffffffffff58e, 0x8, 0x7, './file0'}, {{0x2, 0x2, 0x1}, 0x984c, 0x1f, 0x7, './file0'}]}}, 0x68) [ 2023.692133] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2023.708660] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2023.722748] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2023.737868] Dev loop0: unable to read RDB block 1 [ 2023.738146] loop0: unable to read partition table [ 2023.738996] loop0: partition table beyond EOD, truncated [ 2023.739081] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000c63000000000000bc1c4500000000000035000000036326fec68b3e95ea3f80e7116ccb7ba86287d100d70700000000000000f0000000000000"], &(0x7f00000000c0)=0x59) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x2010, r2, 0x100000000) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 2023.901035] Dev loop3: unable to read RDB block 1 [ 2023.915028] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2023.929494] loop3: unable to read partition table [ 2023.943849] loop3: partition table beyond EOD, truncated [ 2023.954417] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:17 executing program 0: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, 0xb, 0x6, 0x301}, 0x14}}, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r2, 0x0, 0x80, 0x4}}}, 0x90) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0xff9c, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}}, 0xff3c}, 0x90) open(&(0x7f00000000c0)='./file0\x00', 0x4c000, 0x100) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) r7 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r7, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r7, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000180)=0x4) [ 2024.009601] Dev loop3: unable to read RDB block 1 [ 2024.014786] loop3: unable to read partition table [ 2024.037480] loop3: partition table beyond EOD, truncated 21:14:17 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x2, {0x4, 0x3, 0x7d, 0x8, 0x936e, 0x6, {0x1, 0x0, 0xd5d, 0x6, 0x200, 0x4, 0x20000000, 0x5, 0x200, 0x6, 0x10001, r1, 0x0, 0x80, 0x4}}}, 0x90) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0xd44b, 0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, 0x0) 21:14:17 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) prctl$PR_GET_NO_NEW_PRIVS(0x27) 21:14:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r2, 0x80045518, &(0x7f0000000100)=0x76b2) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000100)={0x4, "d2df5cea1cf7f299f4522e682c679ebc0fac7046648aa2ce99abdf940fce310d", 0x2, 0x6, 0x5, 0x320000, 0x0, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r4 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r4, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x20, r6, 0xab9535e9a6578fc1, 0x0, 0x0, {0x5}, [@NL80211_ATTR_WDEV={0x5}, @NL80211_ATTR_WIPHY, @NL80211_ATTR_WIPHY]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00062b67eeff000006001a01020d57c695d92680ab24846d8f69573b00"/41], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x10) [ 2024.515604] Dev loop3: unable to read RDB block 1 [ 2024.520808] loop3: unable to read partition table [ 2024.521907] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2024.532059] loop3: partition table beyond EOD, truncated 21:14:17 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xc042, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f00000000c0)={0x2, 0x1, [0x3de1, 0x10000, 0xfe0000, 0x0, 0x10000, 0xe, 0xd1e5, 0x10001]}) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0xffffffff, 0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000300)='./file0\x00', 0x2, 0x0, 0x0, 0x18a0018, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000100)=ANY=[@ANYBLOB="08000000000000000700000000000000040000000000000001000000000000002d000000000000000608000900000000000000000000000000000000000000000000000000000000000000000000000000000100000000001f00000000000000000000800000000009020308000000000000000000000000000000000000000000000000000000000000000000000000000001000000000067d8000000000000a7000000000000001b817f030000000000000000000000000000000000000000000000000000000000000000000000000000000000030000070000000000000007000000000000003f8b0202000000000000000000000000000000000000000000000000000000000000000000000000480b00000000000006000000000000000000000000000000021700000000000000000000000000000000000000000000000000000000000000000000f8ffffffffffffff7f00000000000000600500000000000028078108000000000000000000000000000000000000000000000000000000000000000000000000090000000000000007000000000000007f0000000000000005061f8000"/460]) [ 2024.556424] Dev loop3: unable to read RDB block 1 [ 2024.579718] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2024.582377] loop3: unable to read partition table [ 2024.593467] loop3: partition table beyond EOD, truncated [ 2024.600575] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2024.622572] Dev loop0: unable to read RDB block 1 [ 2024.623207] loop0: unable to read partition table [ 2024.624085] loop0: partition table beyond EOD, truncated 21:14:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f050000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2024.624221] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 21:14:18 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x400080, 0x0) recvfrom$rose(r0, &(0x7f00000000c0)=""/194, 0xc2, 0x2, &(0x7f00000001c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @default}, 0x1c) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8444, 0x0) [ 2024.667208] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2024.680453] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2024.692002] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2024.712282] netlink: 'syz-executor.5': attribute type 153 has an invalid length. [ 2024.911319] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2025.067838] Dev loop0: unable to read RDB block 1 21:14:18 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:18 executing program 5: write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0x40, 0x4, 0x8}, 0xffffffff}}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x3}) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x44080}, 0x44) [ 2025.110074] loop0: unable to read partition table [ 2025.110372] loop0: partition table beyond EOD, truncated [ 2025.110882] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2025.115725] netlink: 'syz-executor.5': attribute type 153 has an invalid length. [ 2025.187669] Dev loop0: unable to read RDB block 1 [ 2025.187697] loop0: unable to read partition table [ 2025.187760] loop0: partition table beyond EOD, truncated [ 2025.276640] Dev loop3: unable to read RDB block 1 [ 2025.282142] loop3: unable to read partition table [ 2025.298387] loop3: partition table beyond EOD, truncated [ 2025.304216] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 21:14:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000040)='#\xf1%^)-\x00', 0x7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$USBDEVFS_CLAIM_PORT(r2, 0x80045518, &(0x7f0000000100)=0x76b2) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x1, @remote, 0x7f}}}, 0x30) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x240, 0x2, 0x0, 0x4, 0x0, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x1}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}) 21:14:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2025.372859] Dev loop3: unable to read RDB block 1 [ 2025.378579] loop3: unable to read partition table [ 2025.384028] loop3: partition table beyond EOD, truncated 21:14:18 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x3e, 0x0, 0xfffffffc}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x8044, 0x0) 21:14:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f050000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f050000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f050000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:19 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x32, &(0x7f0000000040), 0x4) r0 = syz_open_procfs(0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f050000", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 21:14:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0xffffffff, 0x4) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001b80)=ANY=[@ANYBLOB="240000ff030000000000000000000000000000007526f4f33814336b70145e402f4e27f4e96b704330cf5bcbe25fd65097f65a1b1323c5f8c96e20bc4cf90ebc3a7b7a25769ed603466605776fa48cbd68216a7d7c8df7b563a903b2b20b9eaffd671d79ac62cd03bf6a381cfcaf06bc168bc056af27add39fe906c436e177726ed41e22449bd778b9f772352c45f5f642db4c1967ef16cadb4b5a86efe157f3e74b511dc1a4eb57629e19486ad0449dae", @ANYRES32=0x0], 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 21:14:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x74) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000001b40)={0x10, 0x0, 0x10000000000001}, 0xffffffffffffff08) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000f05000000401cffa3", @ANYBLOB], 0x38}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 2025.600826] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2025.672266] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2025.818779] Dev loop0: unable to read RDB block 1 [ 2025.819246] loop0: unable to read partition table [ 2025.821994] loop0: partition table beyond EOD, truncated [ 2025.822196] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2025.918024] Dev loop3: unable to read RDB block 1 [ 2025.919241] loop3: unable to read partition table [ 2025.920913] loop3: partition table beyond EOD, truncated [ 2025.921491] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2025.975099] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2026.047051] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2026.107998] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2026.247435] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2026.270536] Dev loop0: unable to read RDB block 1 [ 2026.270887] loop0: unable to read partition table [ 2026.271750] loop0: partition table beyond EOD, truncated [ 2026.271862] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2026.283582] Dev loop0: unable to read RDB block 1 [ 2026.283608] loop0: unable to read partition table [ 2026.283664] loop0: partition table beyond EOD, truncated [ 2026.320543] Dev loop3: unable to read RDB block 1 [ 2026.321045] loop3: unable to read partition table [ 2026.322240] loop3: partition table beyond EOD, truncated [ 2026.322364] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2026.700708] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2026.782334] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2026.788358] Dev loop0: unable to read RDB block 1 [ 2026.789730] loop0: unable to read partition table [ 2026.790422] loop0: partition table beyond EOD, truncated [ 2026.790511] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2026.823276] Dev loop3: unable to read RDB block 1 [ 2026.823559] loop3: unable to read partition table [ 2026.824823] loop3: partition table beyond EOD, truncated [ 2026.824903] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2026.935426] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2027.000367] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 2027.036830] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 2027.182552] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 2027.217907] Dev loop3: unable to read RDB block 1 [ 2027.217976] loop3: unable to read partition table [ 2027.218597] loop3: partition table beyond EOD, truncated [ 2027.218768] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2027.225185] Dev loop3: unable to read RDB block 1 [ 2027.225218] loop3: unable to read partition table [ 2027.225307] loop3: partition table beyond EOD, truncated [ 2174.057528] INFO: task syz-executor.2:21268 blocked for more than 140 seconds. [ 2174.057540] Not tainted 4.19.128-syzkaller #0 [ 2174.057546] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2174.057552] syz-executor.2 D29456 21268 6698 0x00000004 [ 2174.057573] Call Trace: [ 2174.057600] __schedule+0x8a2/0x1fc0 [ 2174.057622] ? firmware_map_remove+0x1a1/0x1a1 [ 2174.057637] ? lock_downgrade+0x740/0x740 [ 2174.057649] ? __mutex_lock+0x3b9/0x1300 [ 2174.057669] schedule+0x8d/0x1b0 [ 2174.057686] schedule_preempt_disabled+0xf/0x20 [ 2174.057697] __mutex_lock+0x5b8/0x1300 [ 2174.057714] ? fb_open+0xd3/0x430 [ 2174.057731] ? __mutex_add_waiter+0x160/0x160 [ 2174.057744] ? __mutex_add_waiter+0x160/0x160 [ 2174.057780] ? __mutex_unlock_slowpath+0xea/0x670 [ 2174.057810] ? fb_open+0xd3/0x430 [ 2174.057823] fb_open+0xd3/0x430 [ 2174.057841] ? get_fb_info.part.0+0x80/0x80 [ 2174.057857] chrdev_open+0x219/0x5c0 [ 2174.057873] ? lockref_get+0x11/0x50 [ 2174.057888] ? cdev_put.part.0+0x50/0x50 [ 2174.057911] do_dentry_open+0x4a8/0x1160 [ 2174.057927] ? cdev_put.part.0+0x50/0x50 [ 2174.057943] ? security_inode_permission+0xc4/0xf0 [ 2174.057958] ? chown_common+0x550/0x550 [ 2174.057973] ? inode_permission+0x10c/0x540 [ 2174.057994] path_openat+0xe06/0x2eb0 [ 2174.058020] ? path_mountpoint+0xa90/0xa90 [ 2174.058038] ? mark_held_locks+0xf0/0xf0 [ 2174.058061] do_filp_open+0x1a1/0x280 [ 2174.058073] ? expand_files+0x44c/0x7c0 [ 2174.058088] ? may_open_dev+0xf0/0xf0 [ 2174.058110] ? lock_downgrade+0x740/0x740 [ 2174.058123] ? lock_acquire+0x170/0x3c0 [ 2174.058135] ? __alloc_fd+0x34/0x550 [ 2174.058155] ? do_raw_spin_unlock+0x171/0x260 [ 2174.058169] ? _raw_spin_unlock+0x29/0x40 [ 2174.058181] ? __alloc_fd+0x43c/0x550 [ 2174.058203] do_sys_open+0x3aa/0x510 [ 2174.058221] ? filp_open+0x70/0x70 [ 2174.058241] ? __se_sys_clock_nanosleep+0x2b0/0x2b0 [ 2174.058257] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2174.058271] ? trace_hardirqs_off_caller+0x69/0x210 [ 2174.058287] ? do_syscall_64+0x21/0x620 [ 2174.058305] do_syscall_64+0xf9/0x620 [ 2174.058322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2174.058333] RIP: 0033:0x45ca69 [ 2174.058348] Code: 48 c7 44 24 10 00 00 00 00 48 8b 44 24 68 48 89 44 24 18 48 8b 44 24 70 48 89 44 24 20 48 8b 44 24 78 48 89 44 24 28 48 89 4c <24> 30 0f 57 c0 0f 11 44 24 38 48 c7 44 24 48 00 00 00 00 e8 0f d4 [ 2174.058356] RSP: 002b:00007faeb89abc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2174.058369] RAX: ffffffffffffffda RBX: 00000000004f7fc0 RCX: 000000000045ca69 [ 2174.058378] RDX: 0000000000000000 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 2174.058386] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2174.058394] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2174.058402] R13: 00000000000007b7 R14: 00000000004ca978 R15: 00007faeb89ac6d4 [ 2174.058432] INFO: task syz-executor.2:21274 blocked for more than 140 seconds. [ 2174.058439] Not tainted 4.19.128-syzkaller #0 [ 2174.058444] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2174.058449] syz-executor.2 D28688 21274 6698 0x00000004 [ 2174.058469] Call Trace: [ 2174.058488] __schedule+0x8a2/0x1fc0 [ 2174.058509] ? firmware_map_remove+0x1a1/0x1a1 [ 2174.058523] ? lock_downgrade+0x740/0x740 [ 2174.058535] ? __mutex_lock+0x3b9/0x1300 [ 2174.058555] schedule+0x8d/0x1b0 [ 2174.058571] schedule_preempt_disabled+0xf/0x20 [ 2174.058582] __mutex_lock+0x5b8/0x1300 [ 2174.058596] ? fb_open+0xd3/0x430 [ 2174.058613] ? __mutex_add_waiter+0x160/0x160 [ 2174.058627] ? __mutex_add_waiter+0x160/0x160 [ 2174.058643] ? __mutex_unlock_slowpath+0xea/0x670 [ 2174.058673] ? fb_open+0xd3/0x430 [ 2174.058686] fb_open+0xd3/0x430 [ 2174.058703] ? get_fb_info.part.0+0x80/0x80 [ 2174.058717] chrdev_open+0x219/0x5c0 [ 2174.058732] ? lockref_get+0x11/0x50 [ 2174.058747] ? cdev_put.part.0+0x50/0x50 [ 2174.058770] do_dentry_open+0x4a8/0x1160 [ 2174.058786] ? cdev_put.part.0+0x50/0x50 [ 2174.058801] ? security_inode_permission+0xc4/0xf0 [ 2174.058816] ? chown_common+0x550/0x550 [ 2174.058829] ? inode_permission+0x10c/0x540 [ 2174.058851] path_openat+0xe06/0x2eb0 [ 2174.058876] ? path_mountpoint+0xa90/0xa90 [ 2174.058894] ? mark_held_locks+0xf0/0xf0 [ 2174.058916] do_filp_open+0x1a1/0x280 [ 2174.058927] ? expand_files+0x44c/0x7c0 [ 2174.058942] ? may_open_dev+0xf0/0xf0 [ 2174.058964] ? lock_downgrade+0x740/0x740 [ 2174.058976] ? lock_acquire+0x170/0x3c0 [ 2174.058988] ? __alloc_fd+0x34/0x550 [ 2174.059008] ? do_raw_spin_unlock+0x171/0x260 [ 2174.059022] ? _raw_spin_unlock+0x29/0x40 [ 2174.059033] ? __alloc_fd+0x43c/0x550 [ 2174.059057] do_sys_open+0x3aa/0x510 [ 2174.059073] ? filp_open+0x70/0x70 [ 2174.059088] ? __se_sys_clock_nanosleep+0x2b0/0x2b0 [ 2174.059103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2174.059115] ? trace_hardirqs_off_caller+0x69/0x210 [ 2174.059131] ? do_syscall_64+0x21/0x620 [ 2174.059149] do_syscall_64+0xf9/0x620 [ 2174.059166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2174.059175] RIP: 0033:0x45ca69 [ 2174.059188] Code: 48 c7 44 24 10 00 00 00 00 48 8b 44 24 68 48 89 44 24 18 48 8b 44 24 70 48 89 44 24 20 48 8b 44 24 78 48 89 44 24 28 48 89 4c <24> 30 0f 57 c0 0f 11 44 24 38 48 c7 44 24 48 00 00 00 00 e8 0f d4 [ 2174.059195] RSP: 002b:00007faeb898ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2174.059207] RAX: ffffffffffffffda RBX: 00000000004f7fc0 RCX: 000000000045ca69 [ 2174.059216] RDX: 0000000000000000 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 2174.059224] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2174.059232] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2174.059240] R13: 00000000000007b7 R14: 00000000004ca978 R15: 00007faeb898b6d4 [ 2174.059260] [ 2174.059260] Showing all locks held in the system: [ 2174.059271] 1 lock held by khungtaskd/1081: [ 2174.059275] #0: 00000000575fd749 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 2174.059317] 1 lock held by in:imklog/6128: [ 2174.059322] #0: 00000000cab9c53e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xe3/0x100 [ 2174.059357] 3 locks held by syz-executor.5/21248: [ 2174.059364] 1 lock held by syz-executor.2/21268: [ 2174.059369] #0: 00000000bb9a4c4b (&fb_info->lock){+.+.}, at: fb_open+0xd3/0x430 [ 2174.059397] 1 lock held by syz-executor.2/21274: [ 2174.059402] #0: 00000000bb9a4c4b (&fb_info->lock){+.+.}, at: fb_open+0xd3/0x430 [ 2174.059431] [ 2174.059436] ============================================= [ 2174.059436] [ 2174.059442] NMI backtrace for cpu 0 [ 2174.059454] CPU: 0 PID: 1081 Comm: khungtaskd Not tainted 4.19.128-syzkaller #0 [ 2174.059462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2174.059466] Call Trace: [ 2174.059481] dump_stack+0x1fc/0x2fe [ 2174.059498] nmi_cpu_backtrace.cold+0x63/0xa2 [ 2174.059513] ? lapic_can_unplug_cpu.cold+0x3c/0x3c [ 2174.059527] nmi_trigger_cpumask_backtrace+0x1a6/0x1eb [ 2174.059541] watchdog+0x962/0xe40 [ 2174.059560] ? reset_hung_task_detector+0x30/0x30 [ 2174.059574] kthread+0x30b/0x410 [ 2174.059586] ? kthread_park+0x180/0x180 [ 2174.059601] ret_from_fork+0x24/0x30 [ 2174.059623] Sending NMI from CPU 0 to CPUs 1: [ 2174.060263] NMI backtrace for cpu 1 [ 2174.060269] CPU: 1 PID: 21248 Comm: syz-executor.5 Not tainted 4.19.128-syzkaller #0 [ 2174.060275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2174.060278] RIP: 0010:vga16fb_fillrect+0x9d3/0x1960 [ 2174.060289] Code: 08 e8 d1 94 ec fd 31 ff 89 de 31 ed e8 36 96 ec fd 85 db 4d 89 ec 74 22 e8 ba 94 ec fd 45 88 34 24 83 c5 01 89 df 49 83 c4 01 <89> ee e8 96 95 ec fd 39 eb 75 e3 4c 03 6c 24 08 e8 98 94 ec fd 44 [ 2174.060292] RSP: 0018:ffff8880588972c0 EFLAGS: 00000282 [ 2174.060299] RAX: 0000000000040000 RBX: 0000000000000002 RCX: ffffc900105ff000 [ 2174.060304] RDX: 0000000000040000 RSI: ffffffff837b0606 RDI: 0000000000000002 [ 2174.060308] RBP: 0000000000000002 R08: ffff888053d0a340 R09: ffffed10432d62bc [ 2174.060313] R10: ffffed10432d62bb R11: ffff8882196b15df R12: ffff8880000a0002 [ 2174.060318] R13: ffff8880000a0000 R14: 0000000000000000 R15: 0000000053d829ba [ 2174.060323] FS: 00007fd0f4200700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 2174.060327] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2174.060332] CR2: 000055c984d0a920 CR3: 000000008990b000 CR4: 00000000001406e0 [ 2174.060336] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2174.060341] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2174.060343] Call Trace: [ 2174.060346] ? memcpy+0x35/0x50 [ 2174.060350] bit_clear_margins+0x2d5/0x4a0 [ 2174.060353] ? bit_clear+0x4e0/0x4e0 [ 2174.060356] ? vesafb_probe.cold+0x1080/0x1080 [ 2174.060360] fbcon_clear_margins+0x2c7/0x350 [ 2174.060363] fbcon_switch+0xd9f/0x18f0 [ 2174.060366] ? fbcon_set_font+0x870/0x870 [ 2174.060369] ? fbcon_cursor+0x54f/0x760 [ 2174.060372] ? bit_update_start+0x1f0/0x1f0 [ 2174.060376] ? fbcon_set_origin+0x26/0x50 [ 2174.060379] redraw_screen+0x37d/0x870 [ 2174.060382] ? vesafb_probe.cold+0x1080/0x1080 [ 2174.060385] ? set_palette+0x1b0/0x1b0 [ 2174.060389] ? fbcon_set_palette+0x4d0/0x5f0 [ 2174.060392] fbcon_modechanged+0x5a0/0x870 [ 2174.060395] fbcon_event_notify+0x1b2/0x1d60 [ 2174.060399] notifier_call_chain+0xc0/0x230 [ 2174.060402] blocking_notifier_call_chain+0x85/0xa0 [ 2174.060405] fb_set_var+0xc39/0xe00 [ 2174.060408] ? fb_set_suspend+0x130/0x130 [ 2174.060412] ? lock_acquire+0x170/0x3c0 [ 2174.060416] ? lock_fb_info+0x1a/0x70 [ 2174.060419] ? __mutex_lock+0x30a/0x1300 [ 2174.060422] ? mark_held_locks+0xf0/0xf0 [ 2174.060425] ? lock_fb_info+0x1a/0x70 [ 2174.060428] ? __mutex_add_waiter+0x160/0x160 [ 2174.060432] ? lock_acquire+0x170/0x3c0 [ 2174.060435] ? do_fb_ioctl+0x3e1/0x9c0 [ 2174.060438] do_fb_ioctl+0x450/0x9c0 [ 2174.060441] ? fb_write+0x5d0/0x5d0 [ 2174.060445] ? avc_has_extended_perms+0xe4/0xe90 [ 2174.060449] ? check_preemption_disabled+0x41/0x280 [ 2174.060452] ? avc_has_extended_perms+0x870/0xe90 [ 2174.060455] ? avc_ss_reset+0x180/0x180 [ 2174.060459] ? debug_check_no_obj_freed+0x1f5/0x3e1 [ 2174.060462] fb_ioctl+0xda/0x120 [ 2174.060465] ? do_fb_ioctl+0x9c0/0x9c0 [ 2174.060468] do_vfs_ioctl+0xcda/0x12e0 [ 2174.060471] ? selinux_file_ioctl+0x46c/0x5d0 [ 2174.060475] ? selinux_file_ioctl+0x125/0x5d0 [ 2174.060478] ? check_preemption_disabled+0x41/0x280 [ 2174.060482] ? ioctl_preallocate+0x200/0x200 [ 2174.060486] ? selinux_socket_sock_rcv_skb+0x570/0x570 [ 2174.060488] ? __fget+0x345/0x520 [ 2174.060491] ? ksys_dup3+0x3c0/0x3c0 [ 2174.060495] ? security_file_ioctl+0x6c/0xb0 [ 2174.060498] ksys_ioctl+0x9b/0xc0 [ 2174.060501] __x64_sys_ioctl+0x6f/0xb0 [ 2174.060504] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2174.060507] do_syscall_64+0xf9/0x620 [ 2174.060511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2174.060514] RIP: 0033:0x45ca69 [ 2174.060524] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2174.060528] RSP: 002b:00007fd0f41ffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2174.060536] RAX: ffffffffffffffda RBX: 00000000004e4fc0 RCX: 000000000045ca69 [ 2174.060540] RDX: 0000000020000300 RSI: 0000000000004601 RDI: 0000000000000007 [ 2174.060545] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2174.060550] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2174.060555] R13: 00000000000002f7 R14: 00000000004c577c R15: 00007fd0f42006d4 [ 2174.069251] Kernel panic - not syncing: hung_task: blocked tasks [ 2174.069269] CPU: 0 PID: 1081 Comm: khungtaskd Not tainted 4.19.128-syzkaller #0 [ 2174.069278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2174.069283] Call Trace: [ 2174.069305] dump_stack+0x1fc/0x2fe [ 2174.069324] panic+0x26a/0x50e [ 2174.069337] ? __warn_printk+0xf3/0xf3 [ 2174.069354] ? lapic_can_unplug_cpu.cold+0x3c/0x3c [ 2174.069369] ? ___preempt_schedule+0x16/0x18 [ 2174.069383] ? watchdog+0x962/0xe40 [ 2174.069397] ? nmi_trigger_cpumask_backtrace+0x15e/0x1eb [ 2174.069412] watchdog+0x973/0xe40 [ 2174.069431] ? reset_hung_task_detector+0x30/0x30 [ 2174.069445] kthread+0x30b/0x410 [ 2174.069457] ? kthread_park+0x180/0x180 [ 2174.069473] ret_from_fork+0x24/0x30 [ 2174.071262] Kernel Offset: disabled [ 2263.049494] Rebooting in 86400 seconds..