00280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2378.134521] Dev loop4: unable to read RDB block 1 [ 2378.139636] loop4: unable to read partition table [ 2378.160743] loop4: partition table beyond EOD, truncated [ 2378.194628] validate_nla: 14 callbacks suppressed [ 2378.194637] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2378.201859] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000007ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x9, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000240)) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2378.316931] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2378.324987] protocol 88fb is buggy, dev hsr_slave_0 [ 2378.325080] protocol 88fb is buggy, dev hsr_slave_1 [ 2378.325184] protocol 88fb is buggy, dev hsr_slave_0 [ 2378.325284] protocol 88fb is buggy, dev hsr_slave_1 [ 2378.333572] protocol 88fb is buggy, dev hsr_slave_0 [ 2378.340978] protocol 88fb is buggy, dev hsr_slave_1 07:57:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xa, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2378.419765] Dev loop4: unable to read RDB block 1 07:57:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2378.443884] loop4: unable to read partition table [ 2378.483843] loop4: partition table beyond EOD, truncated [ 2378.489916] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) 07:57:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x4800000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xb, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x280, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x1000040, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = accept4$netrom(r0, &(0x7f0000000400)={{0x3, @default}, [@rose, @netrom, @default, @remote, @bcast, @null, @netrom, @bcast]}, &(0x7f0000000480)=0x48, 0x0) dup2(r3, r6) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') r8 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r8, 0xc0305615, &(0x7f00000003c0)={0x0, {0x1, 0x1}}) r9 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$PIO_FONTRESET(r9, 0x4b6d, 0x0) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) sendmsg$nl_xfrm(r10, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYBLOB="a8030000120000042dbd7000fedbdf25fe800000000000000000000000000021000004d30a006c0008001900820000000c0015005c0735000300000008000400633f00002c00130000000000000000000000ffff000003ffac14140b0000000000000000000000000000000008000000b400010067686173682d636500000000000000000000000000000000000000000000000000002de58be2000000000000000000000000000000000000000000000000000000000000480300009181f1bf5e2b9173733a48760aec88e1540c1c848af41db10903f79b32c0ed6a8f613ced0ed9cc8e6e221c885027b8a51eec47a2af5509039b3335be23c36659025581f0fbf0e8c3b1cc2169ea069f72f7ed4bf98c5f1c8ab20d0af59063706daf9888172878246acd00000084020500fe8000000000000000000000000000bb000004d36c00000062ae0000000000000000000000000000000000000235000000020000800000000000000002000000fe88000000000000000000000000010100000006330000000200000000000000000000000000ffffac1414bb06350000000107003b00000000010000ffff7f000001000004d22b0000000a000000000000000000000000000000000000000735000001013f00ba990000000800009f8a0000ff010000000000000000000000000001000004d33c0000000a000000ac1e00010000000000000000000000000000000004020300060000000200000000000000ff010000000000000000000000000001000004d62b000000644c000000000000000000000000000000000000ff340000000101007f32000070000000e9000000ff010000000000000000000000000001000004d26c0000000a000000ff020000000000000000000000000001073500000303010005000000030000000002000000000000000000000000000000000001000004d54c00000002000000ac1414aa000000000000000000000000ff34000000010300090000008dc20000a75b0000e0000002000000000000000000000000000004d23200000002000000ff020000000000000000000000000001023500000200050020000000f29c00000800000000000000000000000000ffffac1e010100000490330000000a000000fe800000000000000000000000000020023500000000020009000000000000000010000000000000000000000000000000000000000004d6320000000a000000ac1414bb000000000000000000000000063500000000040000000000040000000400"/940], 0x3a8}, 0x1, 0x0, 0x0, 0x20014000}, 0x20008000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="808f678b76b9e71d2046009fdae447b21951c4c1f3bce12bccc2440c3257e19de4e3218a"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r7, 0xae04) 07:57:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2378.626608] Dev loop4: unable to read RDB block 1 [ 2378.631543] loop4: unable to read partition table [ 2378.666182] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2378.706026] loop4: partition table beyond EOD, truncated [ 2378.721125] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000008ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) 07:57:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xc, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) [ 2378.835031] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x5a}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r7, 0xffffffe5}, &(0x7f0000000300)=0x8) r8 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000180)) r9 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r9, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2378.904951] Dev loop4: unable to read RDB block 1 07:57:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xd, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2378.926460] loop4: unable to read partition table [ 2378.962906] loop4: partition table beyond EOD, truncated [ 2378.974758] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x4a00000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2379.055657] Dev loop4: unable to read RDB block 1 [ 2379.061170] loop4: unable to read partition table [ 2379.079389] loop4: partition table beyond EOD, truncated 07:57:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xe, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2379.108005] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2379.147782] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:17 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000009ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:57:17 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xf, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2379.325049] Dev loop4: unable to read RDB block 1 07:57:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2379.352635] loop4: unable to read partition table 07:57:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x4c00000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2379.373851] loop4: partition table beyond EOD, truncated [ 2379.381934] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x10, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x2, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2379.484896] Dev loop4: unable to read RDB block 1 [ 2379.489899] loop4: unable to read partition table [ 2379.517096] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2379.529205] loop4: partition table beyond EOD, truncated 07:57:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x42) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f00000000c0)={0x62, &(0x7f00000002c0)="8572c7d884be3c6395b10b64b9d3182b2d85c6fceb7ba71a9f8cd021e50c014fddfb0dbf58695a9b86c10fdafecc87ea83b5d6e02fee2da6013be4831f95c2094d42d0740a0851899cd6ca6e2d00647685579c0a00895ace8664ecd53a127da0d10e"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="2b6370f941c74128450404848d2ac266f96dc8317e"], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$kcm(r8, 0x0, 0x10001) [ 2379.544145] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:17 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000010ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x11, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x5a03000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x3, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x12, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2379.791852] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x13, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2379.844379] Dev loop4: unable to read RDB block 1 [ 2379.849308] loop4: unable to read partition table [ 2379.879412] loop4: partition table beyond EOD, truncated 07:57:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) [ 2379.923289] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x6000000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2380.035065] Dev loop4: unable to read RDB block 1 [ 2380.040008] loop4: unable to read partition table 07:57:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x6, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2380.086326] loop4: partition table beyond EOD, truncated [ 2380.096203] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2380.109432] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:18 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000014ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 07:57:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x14, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) r6 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r10, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x60, r11, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r12}, {0x44, 0x2, [{0x40, 0x25, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r17}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r17, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r17, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r22}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r19, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r22, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r18, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r22, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001500)={'batadv0\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r25 = socket$packet(0x11, 0x2, 0x300) r26 = fcntl$dupfd(r24, 0x0, r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_vcan(r26, 0x8933, &(0x7f0000001540)={'vcan0\x00', 0x0}) r28 = socket$nl_route(0x10, 0x3, 0x0) r29 = socket$nl_route(0x10, 0x3, 0x0) r30 = socket$netlink(0x10, 0x3, 0x0) r31 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r31, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r31, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r30, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r32}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r29, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r28, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r32, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r33 = socket$nl_route(0x10, 0x3, 0x0) r34 = socket$nl_route(0x10, 0x3, 0x0) r35 = socket$netlink(0x10, 0x3, 0x0) r36 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r36, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r36, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r35, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r37}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r34, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r37, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r33, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r37, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000029c0)={'team0\x00', r37}) r39 = socket$nl_route(0x10, 0x3, 0x0) r40 = socket$nl_route(0x10, 0x3, 0x0) r41 = socket$netlink(0x10, 0x3, 0x0) r42 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r42, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r42, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r41, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r43}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r40, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r43, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r39, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r43, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r44 = socket$nl_route(0x10, 0x3, 0x0) r45 = socket$nl_route(0x10, 0x3, 0x0) r46 = socket$netlink(0x10, 0x3, 0x0) r47 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r47, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r47, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r46, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r48}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r45, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r48, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r44, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r48, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a00)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000002b00)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = socket$packet(0x11, 0x2, 0x300) r52 = fcntl$dupfd(r50, 0x0, r51) ioctl$PERF_EVENT_IOC_ENABLE(r52, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r52, 0x29, 0x22, &(0x7f0000002b40)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000002c40)=0xe8) r54 = socket$nl_route(0x10, 0x3, 0x0) r55 = socket$nl_route(0x10, 0x3, 0x0) r56 = socket$netlink(0x10, 0x3, 0x0) r57 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r57, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r57, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r56, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r58}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r55, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r58, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r54, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r58, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r59 = socket$nl_route(0x10, 0x3, 0x0) r60 = socket$nl_route(0x10, 0x3, 0x0) r61 = socket$netlink(0x10, 0x3, 0x0) r62 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r62, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r62, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r61, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r63}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r60, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r63, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r59, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r63, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005480)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000005580)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r66 = socket$packet(0x11, 0x2, 0x300) r67 = fcntl$dupfd(r65, 0x0, r66) ioctl$PERF_EVENT_IOC_ENABLE(r67, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r67, 0x29, 0x23, &(0x7f0000005840)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000005940)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000006c00)={@rand_addr, 0x0}, &(0x7f0000006c40)=0x14) r70 = socket$nl_route(0x10, 0x3, 0x0) r71 = socket$nl_route(0x10, 0x3, 0x0) r72 = socket$netlink(0x10, 0x3, 0x0) r73 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r73, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r73, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r72, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r74}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r71, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r74, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r70, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r74, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r75 = socket$nl_route(0x10, 0x3, 0x0) r76 = socket$nl_route(0x10, 0x3, 0x0) r77 = socket$netlink(0x10, 0x3, 0x0) r78 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r78, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r78, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r77, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r79}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r76, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r79, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r75, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r79, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r81 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r80, 0x0, r81) ioctl$ifreq_SIOCGIFINDEX_team(r80, 0x8933, &(0x7f0000007100)={'team0\x00', 0x0}) r83 = socket$nl_route(0x10, 0x3, 0x0) r84 = socket$nl_route(0x10, 0x3, 0x0) r85 = socket$netlink(0x10, 0x3, 0x0) r86 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r86, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r86, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r85, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r87}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r84, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r87, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r83, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r87, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007140)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000007240)=0xe8) r89 = socket$nl_route(0x10, 0x3, 0x0) r90 = socket$nl_route(0x10, 0x3, 0x0) r91 = socket$netlink(0x10, 0x3, 0x0) r92 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r92, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r92, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r91, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r93}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r90, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r93, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r89, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r93, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r95 = socket$packet(0x11, 0x2, 0x300) r96 = fcntl$dupfd(r94, 0x0, r95) ioctl$PERF_EVENT_IOC_ENABLE(r96, 0x8912, 0x400200) getpeername$packet(r96, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0x14) sendmsg$TEAM_CMD_NOOP(r9, &(0x7f0000007c40)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000007c00)={&(0x7f0000000500)={0x944, r11, 0x304, 0x70bd26, 0x25dfdbfc, {}, [{{0x8, 0x1, r17}, {0xf0, 0x2, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x0, 0x4, 0x6e, 0x5}, {0xd9, 0x5, 0x4, 0x10000}, {0x8, 0x20, 0x20, 0x10001}, {0x3, 0x5, 0x3, 0x5}, {0x9, 0x1f, 0xc0, 0x7}, {0x7, 0xfe, 0x4, 0x1}, {0x8, 0x1f, 0x40, 0x7fffffff}, {0x20, 0x1f, 0x4}, {0x0, 0x3f, 0x2, 0x8}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r22}, {0x144, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r27}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r32}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r38}, {0x1ec, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r43}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r48}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r49}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r53}, {0xc4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r58}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r63}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8}, {0x178, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r64}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7c3b}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x4, 0x6, 0xfd, 0x101}, {0x5, 0x6, 0x0, 0x9}]}}}, {0x40, 0x1, @lb_port_stats={{{0x22, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r68}}}]}}, {{0x8}, {0x168, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r69}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @enabled={{{0x0, 0x1, 'enabled\x00'}}, {0x0, 0x6, r97}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r74}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x60}}, {0x8, 0x6, r79}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r82}}}]}}, {{0x8, 0x1, r87}, {0x134, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r88}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xf3}}, {0x8, 0x6, r93}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x944}, 0x1, 0x0, 0x0, 0x8000}, 0x40) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r6, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 07:57:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x6558000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x18, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2380.315863] Dev loop4: unable to read RDB block 1 [ 2380.320860] loop4: unable to read partition table 07:57:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, 0x0, 0x0, 0x0) 07:57:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x9, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2380.359418] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2380.373824] loop4: partition table beyond EOD, truncated [ 2380.380437] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x300, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_ENDIAN(r8, 0x4008af14, &(0x7f0000000240)={0x1, 0x1f}) write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40004) [ 2380.495359] Dev loop4: unable to read RDB block 1 [ 2380.500450] loop4: unable to read partition table [ 2380.511414] loop4: partition table beyond EOD, truncated [ 2380.528267] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:18 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000023ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x500, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x6800000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x300, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, 0x0, 0x0, 0x0) [ 2380.709413] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2380.740364] Dev loop4: unable to read RDB block 1 [ 2380.751451] loop4: unable to read partition table 07:57:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f00000004c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@measure='measure'}]}}) r6 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VHOST_SET_FEATURES(r9, 0x4008af00, &(0x7f0000000240)=0x8000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000180)) r10 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r10, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x600, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2380.770920] loop4: partition table beyond EOD, truncated [ 2380.793306] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, 0x0, 0x0, 0x0) [ 2380.905317] Dev loop4: unable to read RDB block 1 [ 2380.910429] loop4: unable to read partition table [ 2380.945157] loop4: partition table beyond EOD, truncated 07:57:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x6c00000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x700, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2380.966589] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x600, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:18 executing program 1 (fault-call:8 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:18 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000042ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="6ef33c3197ae982386628e1e983b4caf17088f78983d985924d124bee1e1451982d9b804e0fed0fc17db568408261b20b36ceccfebfdbe104dd2661d88027f0fac7c837ccc6387b77da4a0160709801e8d013524d18c2c12dd11000000"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x900, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x900, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2381.281873] Dev loop4: unable to read RDB block 1 [ 2381.287800] loop4: unable to read partition table [ 2381.310765] loop4: partition table beyond EOD, truncated 07:57:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x7400000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xa00, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2381.332423] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x4) 07:57:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e20, 0x5, @ipv4={[], [], @local}, 0x81}, @in6={0xa, 0x4e21, 0x5, @empty, 0x1ff}, @in6={0xa, 0x4e23, 0x0, @rand_addr="5f4478a7f1e9299951a0ad0b9ee2aa9b", 0x1}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x2, @empty, 0x5}], 0x80) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/context\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000000"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0xd55, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2381.466770] Dev loop4: unable to read RDB block 1 [ 2381.472472] loop4: unable to read partition table [ 2381.490672] loop4: partition table beyond EOD, truncated [ 2381.508556] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xb00, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:19 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000048ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x8) 07:57:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x7a00000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xc00, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2381.746222] Dev loop4: unable to read RDB block 1 [ 2381.753718] loop4: unable to read partition table [ 2381.760009] loop4: partition table beyond EOD, truncated [ 2381.785485] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x6b6b6b) 07:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xd00, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2381.913592] Dev loop4: unable to read RDB block 1 [ 2381.927211] loop4: unable to read partition table [ 2381.953361] loop4: partition table beyond EOD, truncated 07:57:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x7e03000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2381.981744] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000240)="5fd1abb22b8a9c467ad800e09eee5c174173121b95611467b61cfdad749fa83d6ee23a353acf3efe484430fd6f2848c211cf5abd669eb2f104accd387d49d0d1e2b029aeb74921a2b715440a43", 0x4d) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x3f00, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:19 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff0100004cff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xe00, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x1000000) 07:57:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2382.274702] Dev loop4: unable to read RDB block 1 [ 2382.280569] loop4: unable to read partition table [ 2382.300021] loop4: partition table beyond EOD, truncated 07:57:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xf00, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2382.321439] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x4000000) 07:57:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x550d, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x8035000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2382.418740] Dev loop4: unable to read RDB block 1 [ 2382.429873] loop4: unable to read partition table [ 2382.438516] loop4: partition table beyond EOD, truncated [ 2382.451049] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:20 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000060ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x8000000) 07:57:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x1100, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000240)={0x5, 0xbd4f}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x200000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2382.681155] Dev loop4: unable to read RDB block 1 [ 2382.698815] loop4: unable to read partition table [ 2382.711373] loop4: partition table beyond EOD, truncated [ 2382.734894] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x1200, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x8100000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x6b6b6b00) [ 2382.825021] Dev loop4: unable to read RDB block 1 [ 2382.829948] loop4: unable to read partition table [ 2382.864173] loop4: partition table beyond EOD, truncated [ 2382.869695] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r3 = getpgid(r2) ptrace$setregs(0xd, r3, 0x5, &(0x7f0000000240)="86a3cea9608d79c7134205414a2a2206bdea97acdcab34291cbdd8bea519d473") r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r1, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000180)) r7 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r5, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r7, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:20 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000068ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x1000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x8600000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x1300, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x82ffffff) [ 2383.104399] Dev loop4: unable to read RDB block 1 [ 2383.121693] loop4: unable to read partition table 07:57:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') r7 = socket$netlink(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, r8, 0xb03, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14}]}, 0x340}}, 0x0) sendmsg$TIPC_NL_NET_SET(r6, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xb58c080e0151253}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x14, r8, 0x200, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000240)={{0xc0bfb7e9192e303, @loopback, 0x4e23, 0x1, 'ovf\x00', 0x31, 0x101, 0x1f}, {@multicast2, 0x4e23, 0x2, 0xffffffff, 0xfffffae7, 0xfff}}, 0x44) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2383.165470] loop4: partition table beyond EOD, truncated [ 2383.199576] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x86ddffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x2000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2383.306564] Dev loop4: unable to read RDB block 1 [ 2383.319998] validate_nla: 13 callbacks suppressed [ 2383.320007] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2383.339084] loop4: unable to read partition table 07:57:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x1400, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0xfeffffff) [ 2383.363994] loop4: partition table beyond EOD, truncated [ 2383.378800] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:21 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff0100006cff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x1800, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2383.473649] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x8847000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0xffffff82) 07:57:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x3000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, r3, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000180)) r9 = openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r7, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r9, &(0x7f0000000240)=ANY=[@ANYBLOB="b61d90e9eed02dd87726402d4e3d32cdefc4ee3a433397e5e5bfb4c18150548e43a2403b11f425c3845f2eb9f734dd1b9f4cee9f287bc42b055028d42af4c3ee6b671eeafd680c6e1009d11106cd67d3ce01235924c52c8558e85cdaef4677af470ff4b24c872f15a179ecba13e30d51c162a30b27896bedeecd2f36ee97e8e2"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2383.629747] Dev loop4: unable to read RDB block 1 [ 2383.639859] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2383.667109] loop4: unable to read partition table 07:57:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x1000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2383.686357] loop4: partition table beyond EOD, truncated [ 2383.707941] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0xfffffffe) [ 2383.807263] Dev loop4: unable to read RDB block 1 [ 2383.813270] loop4: unable to read partition table [ 2383.818621] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2383.842297] loop4: partition table beyond EOD, truncated 07:57:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000240)=""/17) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x1010000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2383.862527] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x6000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:21 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000074ff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x8848000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x9000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x1000000000000) [ 2384.083603] net_ratelimit: 19 callbacks suppressed [ 2384.083610] protocol 88fb is buggy, dev hsr_slave_0 [ 2384.093875] protocol 88fb is buggy, dev hsr_slave_1 [ 2384.104728] Dev loop4: unable to read RDB block 1 [ 2384.109891] loop4: unable to read partition table 07:57:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x2000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2384.153145] loop4: partition table beyond EOD, truncated [ 2384.171832] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2384.183090] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000240)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) r6 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PPPOEIOCDFWD(r9, 0xb101, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="4636e6eec3cc74d0c8e8b638b680d9b0abeb75366e3fc05eff3120000000c2543dec42d664fac6"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2384.243587] protocol 88fb is buggy, dev hsr_slave_0 [ 2384.248756] protocol 88fb is buggy, dev hsr_slave_1 [ 2384.266825] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2384.314174] Dev loop4: unable to read RDB block 1 07:57:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x3000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x6b6b6b00000000) [ 2384.343731] loop4: unable to read partition table [ 2384.348923] loop4: partition table beyond EOD, truncated [ 2384.371897] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x20000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:22 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff0100007aff0700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x8864000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2384.563597] protocol 88fb is buggy, dev hsr_slave_0 [ 2384.563625] protocol 88fb is buggy, dev hsr_slave_0 [ 2384.568782] protocol 88fb is buggy, dev hsr_slave_1 [ 2384.573873] protocol 88fb is buggy, dev hsr_slave_1 [ 2384.578954] protocol 88fb is buggy, dev hsr_slave_0 [ 2384.588943] protocol 88fb is buggy, dev hsr_slave_1 07:57:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x100000000000000) 07:57:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x4000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2384.622279] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) personality(0x4000005) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_AUTH_MAGIC(r3, 0x40046411, &(0x7f00000000c0)=0x8) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') ioctl$VIDIOC_ENUMSTD(r6, 0xc0485619, &(0x7f00000002c0)={0x3, 0x8000e, "1d984461bed602273fcc9ee00f08201556297b56927b3568", {0x6, 0x3}, 0x57b}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r7, 0x40505331, &(0x7f0000000240)={{0xb0, 0xd8}, {0x2, 0x5c}, 0xdeaf, 0x8, 0x3}) write$cgroup_subtree(r8, &(0x7f0000000380)=ANY=[@ANYBLOB="0205e35800b7f4c8000051c32a8320a60bb606729d8e8ac9678b70a824413a989f1c83e5e6990b10beb70da6f4eaaf6caa64d8c292c50a253319861e4bf0683f1cae4c0043482cc0edf3d35ea3ddc10722bcd4ff64b08267eb6bbe357defa19e1d281158577bab03166b2b97369fff000000e7b76c993643b1c56e19a162702c19b600388a7b9e6416466841d17eda396e3b8300e930af9bb7"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x3f000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2384.704815] Dev loop4: unable to read RDB block 1 [ 2384.716729] loop4: unable to read partition table [ 2384.726446] loop4: partition table beyond EOD, truncated [ 2384.743403] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x5000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x88a8ffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x400000000000000) [ 2384.897316] Dev loop4: unable to read RDB block 1 [ 2384.911278] loop4: unable to read partition table [ 2384.936244] loop4: partition table beyond EOD, truncated 07:57:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x550d0000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2384.952890] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:22 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000950700000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x6000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2385.001568] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9c2}}, 0x0, 0xfffffffbfffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x1, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') sendto$x25(r5, &(0x7f0000000280)="2ff1b72d542478c5eb73d0ed484c8574b3f3e5f30718df3ca190d186e554d9962db7fae3ec708fa839c71c3f5359ba82ad34e0604e0590872a93f51469647047603333a732a1c528fb3cc535ea314d79437a07c399f3934c5161c44f501507640f1a396e9c2a762d2100c1894eabb4bbb7f0480116afba4fb88c1899aefe185c7b8310adae3fa080c7a742c808cc9f41a85faccf8292ff0292f33d1f4e0a93ea87e6591ef1bbeb2e931f96321e", 0xad, 0x4050880, 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000180)) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001380)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000380)=""/4096, 0x1000, 0x8, 0x9, 0x1f, 0x2, 0x6}, 0x120) r7 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r8 = syz_open_dev$char_usb(0xc, 0xb4, 0x4) fcntl$dupfd(r8, 0x0, 0xffffffffffffffff) writev(r1, &(0x7f0000002580)=[{&(0x7f00000025c0)="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", 0x100c}, {&(0x7f00000024c0)="ef8d2efc76113373c5d5ce7e3b213b58416406702cf0e6a9364dd7abcc0fa35514aa63e8e58257355ca102c3fcab7fe428c2d57d34aab9e445486b68f81b8408ab6882eb8fd2c6131e66dc895305f718baf24e352715009ebe91824fe49e48f7d8c5141393a9e28b05bce40b59e6e676a7e74ccb14f5c2deb501cbd4d3d8ccfcba87b40d1e61812418896b0c48231327d83a0ad7362e0f15d89ee2241cea24980ed70d0ef99dd9fada004fa76f1a93012b1818bcb9c3", 0xb6}], 0x2) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) write$cgroup_subtree(r7, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2385.146729] Dev loop4: unable to read RDB block 1 [ 2385.152420] loop4: unable to read partition table 07:57:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x800000000000000) 07:57:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0xf0ffffff, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2385.187729] loop4: partition table beyond EOD, truncated [ 2385.196964] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x7000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x88caffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2385.330459] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2385.347222] Dev loop4: unable to read RDB block 1 [ 2385.354517] loop4: unable to read partition table [ 2385.360867] loop4: partition table beyond EOD, truncated 07:57:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x8906000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2385.403722] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x82ffffff00000000) 07:57:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="687d3cad20"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$packet(0x11, 0x2, 0x300) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bind$tipc(r11, &(0x7f0000000240)=@id={0x1e, 0x3, 0x0, {0x4e21, 0x4}}, 0x14f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$packet(0x11, 0x2, 0x300) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) write$cgroup_subtree(r14, &(0x7f00000002c0)=ANY=[@ANYBLOB="2d637075205c72646d61202b6df36d6f727920399b6bacae2253a050d5581b348c4b8752c989d82023ad0ac91a2b99690f4e5f4599312c06c41088d6d5406303627666a5c6b44e9e136f2b69ab090536c900000000"], 0x13) 07:57:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x8000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:23 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0300000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2385.482589] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0xffffff7f, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x9000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2385.645025] Dev loop4: unable to read RDB block 1 [ 2385.650136] loop4: unable to read partition table [ 2385.677560] loop4: partition table beyond EOD, truncated 07:57:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0xfeffffff00000000) 07:57:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x9effffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2385.704451] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) keyctl$set_reqkey_keyring(0xe, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x181800, 0x0) setsockopt$bt_BT_FLUSHABLE(r6, 0x112, 0x8, &(0x7f0000000380)=0x1, 0x4) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xa000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2385.854490] Dev loop4: unable to read RDB block 1 [ 2385.863085] loop4: unable to read partition table 07:57:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0xfe5f, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000012}, 0x4054855) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0xfffffff0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2385.895727] loop4: partition table beyond EOD, truncated 07:57:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xaa10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2385.948913] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:23 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0400000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xb000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x881}, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r9) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={0x0, r11, 0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r11, 0x1, "cb311c", "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"}}, 0x110) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xab10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x1000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2386.240126] Dev loop4: unable to read RDB block 1 07:57:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xc000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2386.263436] loop4: unable to read partition table [ 2386.291090] loop4: partition table beyond EOD, truncated [ 2386.308899] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000000)={r10}) 07:57:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xd000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2386.434506] Dev loop4: unable to read RDB block 1 [ 2386.439503] loop4: unable to read partition table [ 2386.452254] loop4: partition table beyond EOD, truncated [ 2386.471846] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="2b6704550056e00d052a0065c814b9559f77e83eab29a831f67610db3c13fa829ccf46f21381059affcc45c6032956721c18093572db2f96c8aa44e380ffc38f6a717683f469"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x20000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xac10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:24 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0600000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x24101, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0xfffffffffffffffe) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x3caa6d1f4c3d8868, 0x0) 07:57:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xe000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2386.725937] Dev loop4: unable to read RDB block 1 [ 2386.736592] loop4: unable to read partition table 07:57:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x100000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xad10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0xf000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2386.779964] loop4: partition table beyond EOD, truncated [ 2386.813850] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x40000, 0x228040) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="b37b707520"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="28aa60551d3aab474d3c0b9b3dd841cd98721f3c8ff3d568d4c9a1be7f6c2b28a818050408e7091fa0f387ddd5a89689b34a859143fc1e079d200ac6ac60713de2d9fc", 0x43) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x10000) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x1050}, 0x400c814) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000300)=""/200, 0xc8, 0x7) r7 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x906b, 0x40000) dup(r7) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r6, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r9, 0x6, 0x38, &(0x7f0000000000), 0x4) r10 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x80000) [ 2386.927132] Dev loop4: unable to read RDB block 1 [ 2386.941810] loop4: unable to read partition table [ 2386.964885] loop4: partition table beyond EOD, truncated [ 2386.984225] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x10000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:24 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0800000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x200000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1cff0f0000"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) connect$l2tp(r7, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r9, {0x2, 0x4e23, @broadcast}, 0x0, 0x4, 0x3, 0x4}}, 0x2e) 07:57:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xae10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2387.223922] Dev loop4: unable to read RDB block 1 07:57:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x300000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x11000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2387.251139] loop4: unable to read partition table [ 2387.263984] loop4: partition table beyond EOD, truncated [ 2387.290244] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x12000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x600000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="00040000", @ANYRES16=0x0, @ANYBLOB="000225bd7000fddbdf2507000000080005000100000008000600b82300001c00030008000800080000000800a900ac1414bb08000500ac1f010108000400080004006a8c00000c00010008000800ff010000080004006b0500000800060000800000080006000cf0ffff20000300080007004e21000014000600fe8000000000000000000000000000aa00000000"], 0x94}, 0x1, 0x0, 0x0, 0x24041185}, 0x7) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$packet(r2, &(0x7f0000000300), 0x0, 0x0) [ 2387.430338] Dev loop4: unable to read RDB block 1 [ 2387.444869] loop4: unable to read partition table [ 2387.476048] loop4: partition table beyond EOD, truncated 07:57:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xaf10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2387.519986] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x13000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:25 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff1000000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@loopback, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x900000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2387.735958] Dev loop4: unable to read RDB block 1 [ 2387.740899] loop4: unable to read partition table [ 2387.766925] loop4: partition table beyond EOD, truncated 07:57:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x14000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) futimesat(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x77359400}, {0x77359400}}) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2387.805739] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb010010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x2000000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2387.971845] Dev loop4: unable to read RDB block 1 [ 2387.991464] loop4: unable to read partition table [ 2388.011829] loop4: partition table beyond EOD, truncated 07:57:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x18000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2388.053424] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80003, 0x0) write$P9_RCLUNK(r4, &(0x7f0000000080)={0x7, 0x79, 0x2}, 0x7) 07:57:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x3, 0x101000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$bt_sco_SCO_CONNINFO(r8, 0x11, 0x2, &(0x7f0000000280)=""/20, &(0x7f00000002c0)=0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="67aacc7dea19e7c8bb46c28417e6435ca46317211ffccb75335af4db1dc16d633c09e98cf1b5d9b2664d1130101376f54f9861f2d156746b3c"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:26 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff3500000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x3f00000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb110010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x5346bcdffac43237}, 0x400c810) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2388.312463] Dev loop4: unable to read RDB block 1 [ 2388.330974] loop4: unable to read partition table [ 2388.337745] loop4: partition table beyond EOD, truncated [ 2388.363797] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="0f6380bf4d85612b63707520a7941027742a8598b843cedf0d6db7b6"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2388.425521] validate_nla: 12 callbacks suppressed [ 2388.425531] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2388.455226] Dev loop4: unable to read RDB block 1 [ 2388.460155] loop4: unable to read partition table [ 2388.466628] loop4: partition table beyond EOD, truncated 07:57:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x550d000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2388.488945] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:26 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff3600000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb210010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x40000000015, 0x80005, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r10}, 0x10) ioctl$BLKROSET(r7, 0x125d, &(0x7f0000000080)=0x3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000140)={r10, @in6={{0xa, 0x4e24, 0x7, @ipv4={[], [], @local}, 0x6}}, 0xff, 0x0, 0x4, 0xfffffffe, 0x200}, &(0x7f0000000000)=0x98) 07:57:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2388.730513] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2388.760667] Dev loop4: unable to read RDB block 1 [ 2388.774998] loop4: unable to read partition table 07:57:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x8000000000000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$cgroup_ro(r9, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) r11 = socket(0x40000000015, 0x80005, 0x0) close(r11) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r12, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r11, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r13}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000004c0)={r13, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x1ff, 0x275c, 0x1, 0x7ff}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0)={0x5, 0x8, 0x800e, 0x3f, 0x2, 0x0, 0x0, 0x80000001, r14}, &(0x7f0000000300)=0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x1f, &(0x7f0000000380)={r15, @in6={{0xa, 0x4e24, 0x280, @empty, 0x7}}, 0x20, 0x5}, &(0x7f0000000440)=0x90) r16 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r6, 0x0, r16) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r6, 0xc0096616, &(0x7f0000000240)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2388.794106] loop4: partition table beyond EOD, truncated [ 2388.827336] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'\x00', &(0x7f0000000140)=@ethtool_eeprom={0xb, 0x78, 0x20, 0x43, "5f7503276b90fb8ddb3e0335507400f6287b6eee77e93208b9892d1a2206c8e69bc72bcbfe1d685a44643ec4ceed9494a09e16ac69f41f36137fe9247a6521bbad8dbe"}}) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb310010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2388.955950] Dev loop4: unable to read RDB block 1 [ 2388.968028] loop4: unable to read partition table [ 2389.002607] loop4: partition table beyond EOD, truncated [ 2389.037184] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1, 0x0) lsetxattr$security_smack_transmute(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x2) ioctl$IOC_PR_REGISTER(r6, 0x401870c8, &(0x7f0000000280)={0x80000000, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2389.071536] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:26 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff3c00000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0xf0ffffff00000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-arm64\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x74, "3395d3bca1a35597e61870fdf0568db3633c3c04cfd5ae0bd422c09c2ad379d9b0a807b5e73a640bf222961b5e1a237a01b76691748a1539f5e6c14e979070aecb2745a0921e41910a94764d9d12cc0cc90ddf0741adadece3018e4392e3681c1d2c9f0b2b4526c9fbc02dde2450dd5a5d42ac21"}, &(0x7f0000000080)=0x7c) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair(0xa, 0x0, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, 0xfffffffffffffffd, 0x20004001) 07:57:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb410010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2389.315149] Dev loop4: unable to read RDB block 1 [ 2389.326628] loop4: unable to read partition table [ 2389.349125] loop4: partition table beyond EOD, truncated 07:57:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0xffffff7f00000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2389.385707] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2389.397582] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x1800) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() getpgrp(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$packet(r8, &(0x7f0000000040), 0x0, 0xc0000) [ 2389.501607] Dev loop4: unable to read RDB block 1 07:57:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb510010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2389.531071] loop4: unable to read partition table 07:57:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x474, 0x5}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x40000000015, 0x80005, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100e6c8ff475da6d48c00c9", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, r5}, 0xff89) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r5, 0x4}, &(0x7f0000000280)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0x40000000015, 0x80005, 0x0) close(r10) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r11, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="f6748eee", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r10, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r12}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r9, 0x84, 0x1a, &(0x7f00000002c0)={r12, 0xe, "b2217142390ca03bc25b5d46dec3"}, &(0x7f0000000300)=0x16) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000380)={r6, 0x1f, 0x8, 0x1800, 0x7f, 0x9, 0x3, 0x0, {r13, @in6={{0xa, 0x4e21, 0x7fffffff, @remote, 0x9}}, 0x6, 0x7b2, 0x0, 0x7fff, 0x4}}, &(0x7f0000000440)=0xb0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r14 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = socket$packet(0x11, 0x2, 0x300) r17 = fcntl$dupfd(r15, 0x0, r16) r18 = fcntl$dupfd(r17, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r18, 0x5411, &(0x7f0000000180)) r19 = openat$cgroup_subtree(r14, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r17, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r19, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2389.582198] loop4: partition table beyond EOD, truncated [ 2389.620488] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0xffffffff00000000, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2389.687156] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:27 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff5100000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb610010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$caif_stream(0x25, 0x1, 0x1) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_HYPERV_EVENTFD(r8, 0x4018aebd, &(0x7f00000000c0)={0x1, r3, 0x1}) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2389.864291] Dev loop4: unable to read RDB block 1 [ 2389.871345] loop4: unable to read partition table [ 2389.896756] loop4: partition table beyond EOD, truncated 07:57:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r4, &(0x7f0000000040), 0x0, 0x80000) 07:57:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x3) [ 2389.931615] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2389.940604] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2390.054669] Dev loop4: unable to read RDB block 1 [ 2390.069830] loop4: unable to read partition table 07:57:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2005}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r7, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r12, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r12, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r2, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r7}, @FOU_ATTR_IFINDEX={0x8, 0xb, r12}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x20000010) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = socket$inet_tcp(0x2, 0x1, 0x0) r15 = fcntl$dupfd(r13, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2390.097890] loop4: partition table beyond EOD, truncated 07:57:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb710010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2390.141070] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:28 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000fffc01000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000240)={0x1, 0x3ff}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6) [ 2390.311724] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2390.323621] net_ratelimit: 20 callbacks suppressed [ 2390.323631] protocol 88fb is buggy, dev hsr_slave_0 [ 2390.333758] protocol 88fb is buggy, dev hsr_slave_1 07:57:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x1, @bcast, @rose={'rose', 0x0}, 0x401, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x80000001, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2390.417847] Dev loop4: unable to read RDB block 1 [ 2390.459310] loop4: unable to read partition table [ 2390.484565] protocol 88fb is buggy, dev hsr_slave_0 [ 2390.489702] protocol 88fb is buggy, dev hsr_slave_1 [ 2390.502915] loop4: partition table beyond EOD, truncated 07:57:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_GET_CPUID2(r7, 0xc008ae91, &(0x7f0000000140)={0x2, 0x0, [{}, {}]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb810010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2390.543279] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x100000, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f00000002c0)={0x507, 0x2, 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x9) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r5, 0x4008af60, &(0x7f00000000c0)={@hyper}) r6 = openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') ioctl$RTC_WIE_ON(r7, 0x700f) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="005f41e955a60ef3195a6e7c00000000"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x9) [ 2390.657954] Dev loop4: unable to read RDB block 1 [ 2390.669186] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2390.684827] loop4: unable to read partition table [ 2390.705851] loop4: partition table beyond EOD, truncated [ 2390.725354] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) connect$l2tp(r4, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0x1, {0xa, 0x4e23, 0x526d643f, @ipv4={[], [], @broadcast}, 0x8}}}, 0x32) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:28 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ffe00f000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2390.803574] protocol 88fb is buggy, dev hsr_slave_0 [ 2390.803644] protocol 88fb is buggy, dev hsr_slave_1 [ 2390.808713] protocol 88fb is buggy, dev hsr_slave_1 [ 2390.818858] protocol 88fb is buggy, dev hsr_slave_0 [ 2390.824001] protocol 88fb is buggy, dev hsr_slave_1 [ 2390.850666] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) sendmsg$rds(r2, &(0x7f00000013c0)={&(0x7f0000000080)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/113, 0x71}, {&(0x7f0000001140)=""/178, 0xffffffffffffff5a}, {&(0x7f0000001200)=""/82, 0x30}, {&(0x7f0000001280)=""/33, 0x21}, {&(0x7f00000012c0)=""/116, 0x74}], 0x6, 0xffffffffffffffff, 0x0, 0x4000}, 0x8000084) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2390.944078] Dev loop4: unable to read RDB block 1 [ 2390.949090] loop4: unable to read partition table [ 2390.977392] loop4: partition table beyond EOD, truncated [ 2390.987667] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$evdev(r7, &(0x7f0000000000)=[{{0x0, 0x7530}, 0x17, 0x7, 0x3}], 0x18) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xb910010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000002c0)={0x2, 0x0, &(0x7f0000000280)=""/52, &(0x7f0000000380)=""/143, &(0x7f0000000440)=""/253, 0x2c000}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000080)={0x0, 0xd3, 0x2, 0x1, 0x0, 0x1000, 0x1, 0x62cd, {0x0, @in={{0x2, 0x4e20, @local}}, 0x6, 0x4, 0x8000, 0xffff, 0xc80}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000180)={r8}, 0x8) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000000)={0xffffffff, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000400), &(0x7f0000000240)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r9, 0x0, r10) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r15, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000200000", @ANYRES32=0x0, @ANYBLOB="3e0000000000000007c5c90100000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070600"/20, @ANYRES32=r15, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="3400006400070800000000000039771e19bdf60e25fb36ce0ab85500005ae22a45d72443ea3548492e07b8f8d55c12d6232aa93af842ccfc4093bc997ffc25eda679e3e6085603d50584302f5ab2e3d7b31d4777a3894a7a49bd36dd0000f79e478256000000000000", @ANYRES32=r15, @ANYBLOB="40da00000000faf2000000000c000100677241a52c26000004000200"], 0x34}}, 0x0) sendto$packet(r10, &(0x7f0000000280)="e3a0d1442f6a04effa30c3407253966b30de41f2a4e2d058264378313728f90f27423174b2f75a43cad2f130b2b926d8ad7893714c4471f6d9866cf76b0dfa594688edebf00f4c016d062f678c19d7f38abff22e7af04712c07af38b8c2d2b3e97c7ee3a1816941915102541ab55fce532f5d289cc02ee5a05ace9d819864bc7e8ece9af5c0754b5b47f8c24384154b2fbe55ccb2890a3f1a39246cdfcfbfb8226c5ab1a8e5c56dfc7d4668bd9af5a49d942961137993f3b4f", 0xb9, 0x1, &(0x7f0000000340)={0x11, 0xf7, r15}, 0x14) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2391.092641] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2391.153080] Dev loop4: unable to read RDB block 1 [ 2391.162087] loop4: unable to read partition table [ 2391.192819] loop4: partition table beyond EOD, truncated [ 2391.210079] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) ioprio_get$pid(0x0, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r4, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000140)=@vsock, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)=""/16, 0x10}], 0x1, &(0x7f00000001c0)=""/100, 0x64}, 0x12002) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r2, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xba00000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:29 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0702000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0xbc950417542d990, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x6}}], [{@audit='audit'}]}}) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000300)=""/246) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @empty}, 0x5, 0x4, 0x2, 0x1, 0xfff9, 0x29e}, 0x20) r10 = fcntl$dupfd(r7, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) accept4$packet(r2, &(0x7f0000000040), 0x0, 0x0) 07:57:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r6, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VT_WAITACTIVE(r4, 0x5607) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2391.562590] Dev loop4: unable to read RDB block 1 [ 2391.589731] loop4: unable to read partition table [ 2391.608688] loop4: partition table beyond EOD, truncated 07:57:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xba10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2391.633216] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x8000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000380)={0x0, 0x70, 0x3, 0x9, 0x4, 0xf9, 0x0, 0x6, 0x7e33c613a8db9c34, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x7, 0x7}, 0x12a1a, 0x5fa, 0x3, 0x3, 0x5, 0x5, 0x8}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/31}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet(0x2, 0x3, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0xffffffff00000000, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) socket$inet(0x2, 0x3, 0x9) syz_emit_ethernet(0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xffffffffffffff0f) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 2391.734432] Dev loop4: unable to read RDB block 1 [ 2391.743391] loop4: unable to read partition table [ 2391.756134] loop4: partition table beyond EOD, truncated [ 2391.772028] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000000)=0x5, 0x4) 07:57:29 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0703000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg(r8, &(0x7f0000000300)=[{{&(0x7f0000000240)=@caif=@dbg={0x25, 0x27, 0x1f}, 0x80, &(0x7f0000001840)=[{&(0x7f00000002c0)="c4fda0766693", 0x6}, {&(0x7f0000000380)="1d9885f703eecf4d6a6039824e5f402ce3783386728927f78f229aa4f4a1047d32cbaba0bf1646779c463e9ec8e06bea02c38e6035a8bb0f08aa96afb08e4eb6d7e278dd770f9d36311cced1262a", 0x4e}, {&(0x7f0000000400)="94fd3dba4ff23fdee41364dc35a38ca200ab2ffa8927b83e5293a3a6e47e927bb5da6bd51d1d50409baa857a60819a2d7b3211236f216f4165f121b63ccaafdc90d3a3c81f7f347437007a3ade1d9a9eb1c90664311694a8b8358d366ba7758c4404c2c97ddc6d9adff6c8ff518ed1c6c786302768fad4cb39fb166e65d815c19d6bf83bd674ba07eeb565858e631ba8f57d4a4dc1ce335dfcf6f1ae4046cf3ce69885e58d25ae104f727cd4601d72ae71c2dd4d79cd19e60066e6b68765e25b81feb0f2e80df501f919b55d0f572fb3615755f369d7a7", 0xd7}, {&(0x7f0000000500)="0a44b47fd50832ef05ba8fabb1dca7af7de3cadec202674692bf1355db5ba1b38b6c6c8f363253e080485d7f2cb846653d5647d8140f52d9a333a441e533de0a89c24d0d53d9f94f38bc796258f64b44afe21a7988c4bea577259fede4b3e7cb4713d317d884f6b4bbea5ec688c273aeee03f03a91c461fa4446f893ff5f4dfe57ee5eefed91b7fda0452f035d89702fb02c77336ed825bc7e72c3df0f1da5be8786ded8abd892d70ae4719003896a7e9e28797cb0dfcdd1e5b8d231b0d2ce23e11beb048d4f7fa873ef360710", 0xcd}, {&(0x7f0000000600)="b461f26016442226f7d94df13a1edee7ac025939f1be8feff13499c72b3d3ff356511a9ac2271100420463274624f34f72c3aadf0200b21b1048e84d811719ada0b91a966b082f66a7d03f06f36ec205b4b357eed7a25132ea89c5d7537cd208462cb6bbadcfb84be46f17abe98df1c9b39d9774bb8d42d84b2d5b9cd007cd83ff2bc6cb401e849a0e4e03f1fe9e34e90d8f4e047b4c531edb1fe1aff68f49977bd66189eebbfdd32ccb8894f8a49145d418ec941125c29eb493383871e472b2db8d92ea91ed3ce6f7296de741b01c14d695ab0aae24b3", 0xd7}, {&(0x7f0000000700)="90141fabc72b39e7077805270aa4fa7a05e1d2687b8b35dbf3295940b2719a053706a6e7d2495ec03885a23f19860ca405cbafc90b980e1f0967ed5b48e5f075b6bb8b1915a6e6fd912b00b945bf16592e6e9365385562bc292f5c5f92093b19781d2e35da58d50026c587f77dfd69d2171bab7e0e0b5be0ffe9d252a0b54b34f5ee1742e03fda15d1c99c48652e7f6357dfbe53e3b8bfce929917", 0x9b}, {&(0x7f00000007c0)="3ecc7d0dace3a6a626c3f4c6281de598ccb405039d25d4d7c8b4aa9cd4730e89549efab4cda64eb2cdd86d1007e392e5deee74bd0b9842d503e86698bc429b7e1c8a4ab54d3e0ace9b1cf100a463ff66d259d41e6c4feffc75299be5c38b3d74a3718cc6de8df5cbf6", 0x69}, {&(0x7f0000000840)="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", 0x1000}], 0x8, &(0x7f00000018c0)=[{0xb8, 0x1, 0x4, "33fd3f2b697a8052d1c34e4c5069390d220f9fc2f64f6772242dccb0ab3ffc69477b602aee49a4df13e62fdfb4315814747d484d066c37e7fb8d729d2318b079865ce9e132b4ebadb6df71bcaad128df51bdbcc0b32eb6da6cacdfb09c4dedd64c9dc909fbf61f80e6524323ac9decdadbf8f0e2fc29b3e8c5db4aa1b6b8f684e11c34d6b473ef3d3085b08c24312ebe7cb32870cf462f5eac88bb7de4c909d0ff0b4375"}, {0x88, 0x119, 0xfffffff8, "79be92546496ac6e399c6797434fb6298bc309583ddc082f43abd824b1781a607006a1cc2c331f2e510112691579db702e094dc82f742da3aa18f03e51645cbde95a89d8870f83ef42dbcd7dbc60fa1af60b4b55d4d7123dcbc08a4ce47e4a2fa275ab127788491098ede240bbdd03f02cb5d04524"}, {0xc8, 0x107, 0x80000000, "c04dded836fd43f8b3bdb280519c6b290e175e92b037326d30601e9dbec1607e3eafa0297427902a7a4760e007807a4d4071205a9ad2e254856ea964194fc7a48c43f5a07f5bcdb9b5cf4448f419a984a766bfd5233ba2789afd04b819df0cad26d57056625590d4f90d975f658a9e5fa6f2ab2d61b734569bff4e45acec72b25f1d2ce5ced354c4a944b80b369dbf7545219973c474793d31ba43223cae5538b1b3c8c688b75028596b5984b2b6039923893b"}, {0x100, 0x10c, 0x1f, "e2424f82635a43099935197aa7a6a9f789bd9a1ee5d5528a01871949f901e17db935422c7be0b3bfe9926d2fc9127b608dc39f0fe40e92c4c1e56549c4d2275f2adc32acfa60494d56f01c4f0a9e0b675fcb0ab8433053e92ab65657b10e7327b8136dcdce3c90cac89e36baf3427e66937c7dda0aa4f57962eec994b14a408e9d5ce03316aa02440782511e55a315b90f20ec6de3e9243ae19fe5aef8794c2d1e01f0b3c6425a239d050c9b28d0ca5893090fb7a20b4d0247b36ac941308d69ef1d63b25e5b1891a0027aafeb9399c3bf50292728dcee533a16ec6764a822789a6e3603959d775c3f197b5bfada3332"}, {0x108, 0x1, 0x81, "7eb6e175804c4cf90b9b273376ef30715471793df0ee86c49da178ef81b4674c5ff71c23b61c11ffb591448b27681f5c99b02b6c40c28d7f098410f66bc2b71fa7e473eb662e8fcc43033ce4c6d34f7ac29f42556978a461212803f366472f6db4675bf5c1e9a492c8c71f95c4f73313b8ac286a32046941a4e17a5c8b53ea1b383e7221db3e8ef46253b48e67442e8471b43a6d436da204aa0275599b1d1fe71de983c87a5cfec4a4e12c1dee9e5165ff94e4763b355f8263fe75c853fe23a95ae931489742aa382cc99c787c8f144bd0c2abdbaa613dbe4d303e6d160eabdfc83b5a3e4f0246c9a783a9a709095b355b7d51a71f012e"}, {0xf8, 0x111, 0x7fff, "e0590bc53cebd2ca4ced8e46695c0854411c72f7795bc2cf7dcf763e751e40e42c9c0e1b6c9370f53c98c66c7283fcb79168d7b585c3290b81bce2ac42994705631df48a5407c1d4384fd61b3cd25ee70c0ff06ae4c418cea459ba43f7eb2f902598b8fb08bc64319d297fc1d6135d5fe5b25c0789671a52211ddd412d15992ae1a07530e42257a063eff882b42eb49effe57b4e7303f5187573cc8df3579814654a761a9d65f350cc4ab76d2a862950e394841542f5f8ca57d345f6037373bb9d89a8022ebef4c93d668ab817ecd94fc5c5141db5dc2143fe664623c596115148388a9553684f"}, {0x80, 0x105, 0x10000, "29b3cbbe8a46eeb854aea8ab70a910b4f54e81f4dcf404d8460440337aea68c2684739d411005858889aea71445e7f2455d573536f804a262908b703a37cc635434982c43053852dd11ba57452009fdb4b223b864a9b373da61dcc7a3cb9027e078e80b555e759ce9af2b3d467595ce9"}], 0x588}}], 0x1, 0x40000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r1, 0x0, r2) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$packet(0x11, 0x2, 0x300) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r13, 0x40505412, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0xd}) accept4$packet(r10, &(0x7f0000000080), 0x0, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = socket$packet(0x11, 0x2, 0x300) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r16, 0x4090ae82, &(0x7f0000000300)={[0x6, 0x8, 0xf1, 0x9, 0x800, 0x8, 0x6, 0x7, 0x1f, 0x9, 0x0, 0x6, 0x4000000000000000, 0x2, 0xffffffffffffff75, 0x100000000], 0x1, 0x202000}) 07:57:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xbb10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2392.023064] Dev loop4: unable to read RDB block 1 [ 2392.041050] loop4: unable to read partition table [ 2392.076111] loop4: partition table beyond EOD, truncated [ 2392.111635] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r1, 0x0, r2) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x401, 0x8, 0x1, 0x1ff}]}, 0x10) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xbc10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2392.206076] Dev loop4: unable to read RDB block 1 [ 2392.211018] loop4: unable to read partition table 07:57:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r3, 0xc0305615, &(0x7f0000000240)={0x0, {0x6, 0x6}}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2392.263676] loop4: partition table beyond EOD, truncated [ 2392.290552] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:30 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0704000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2392.403575] protocol 88fb is buggy, dev hsr_slave_0 07:57:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_create1(0x180000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000140)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x78) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2392.508765] Dev loop4: unable to read RDB block 1 [ 2392.529018] loop4: unable to read partition table 07:57:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r6, 0x0, r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) r10 = inotify_init() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$packet(0x11, 0x2, 0x300) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r14, 0x0, r15) r16 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r16, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) r17 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r18, 0x0, r19) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r20, 0x0, r21) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r23 = socket$packet(0x11, 0x2, 0x300) r24 = fcntl$dupfd(r22, 0x0, r23) ioctl$PERF_EVENT_IOC_ENABLE(r24, 0x8912, 0x400200) r25 = gettid() ptrace$setopts(0x4206, r25, 0x0, 0x0) tkill(r25, 0x3c) ptrace$cont(0x18, r25, 0x0, 0x0) ptrace$setregs(0xd, r25, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r25, 0x0, 0x0) r26 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r26, 0x0) write$P9_RWALK(r26, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r27 = dup2(r26, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r27, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r30) r31 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r32) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r34 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r34, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r35, 0x0) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r37 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r27, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r28}, {0x2, 0x7, r30}, {0x2, 0x6, r32}, {0x2, 0x6, r33}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r35}, {}, {0x8, 0x0, r36}, {0x8, 0x2}, {0x8, 0x2, r37}, {0x8, 0x4, r38}], {}, {0x20, 0x4}}, 0x84, 0x2) r39 = getegid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = socket$packet(0x11, 0x2, 0x300) r42 = fcntl$dupfd(r40, 0x0, r41) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r44 = socket$packet(0x11, 0x2, 0x300) r45 = fcntl$dupfd(r43, 0x0, r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r47 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r46, 0x0, r47) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r49 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r48, 0x0, r49) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r50, 0x0, r51) r52 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r52, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) r53 = fcntl$getown(r52, 0x9) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r55 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r55, 0x0) write$P9_RWALK(r55, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r56 = dup2(r55, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r56, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r58 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r58, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r59) r60 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r61) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r63 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r63, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r64, 0x0) r65 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r65, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r66, r54) r67 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r56, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r57}, {0x2, 0x7, r59}, {0x2, 0x6, r61}, {0x2, 0x6, r62}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r64}, {0x8, 0x1}, {}, {0x8, 0x2, r66}, {0x8, 0x2, r67}, {0x8, 0x4, r68}], {0x10, 0x1}, {0x20, 0x4}}, 0x84, 0x2) r69 = getegid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r71 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r70, 0x0, r71) r72 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r72, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r74 = socket$packet(0x11, 0x2, 0x300) r75 = fcntl$dupfd(r73, 0x0, r74) ioctl$PERF_EVENT_IOC_ENABLE(r75, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r77 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r76, 0x0, r77) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r79 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r78, 0x0, r79) r80 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r80, 0x0) write$P9_RWALK(r80, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r81 = dup2(r80, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r81, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r83 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r83, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r84) r85 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r85, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r86) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r88 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r88, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r89, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r92 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r81, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r82}, {0x2, 0x7, r84}, {0x2, 0x6, r86}, {0x2, 0x6, r87}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r89}, {0x8, 0x1, r90}, {0x8, 0x0, r91}, {0x8, 0x2}, {0x8, 0x2, r92}, {0x8, 0x4, r93}], {}, {0x20, 0x4}}, 0x84, 0x2) r94 = getegid() r95 = gettid() ptrace$setopts(0x4206, r95, 0x0, 0x0) tkill(r95, 0x3c) ptrace$cont(0x18, r95, 0x0, 0x0) ptrace$setregs(0xd, r95, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r95, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r97 = socket$packet(0x11, 0x2, 0x300) r98 = fcntl$dupfd(r96, 0x0, r97) ioctl$PERF_EVENT_IOC_ENABLE(r98, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r98, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}}}, &(0x7f00000001c0)=0xe8) getgroups(0x1, &(0x7f0000000200)=[0xee01]) r101 = getpid() getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r103 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r103, 0x0) write$P9_RWALK(r103, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r104 = dup2(r103, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r104, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r106 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r106, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r107) r108 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r108, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r109) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r111 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r111, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r112, 0x0) r113 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r113, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r114, r102) r115 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r104, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000003300)=ANY=[@ANYBLOB="02000000010002000000000002000000", @ANYRES32=r105, @ANYBLOB="02000700", @ANYRES32=r107, @ANYBLOB="94ff317a02000600f4f745b69af09db7905ef9eb156f9525a245818a4a0fcf1e1aeb61249fd745c3d269fccf02d2", @ANYRES32=r109, @ANYBLOB="02000600", @ANYRES32=r110, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="040000000000000008000700", @ANYRES32=r112, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r114, @ANYBLOB="08000200", @ANYRES32=r115, @ANYBLOB="08000400", @ANYRES32=r116, @ANYBLOB="10000000000000002000040000000000"], 0x84, 0x2) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000001ac0)=[r117]) r118 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r118, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r120 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r119, 0x0, r120) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r122 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r121, 0x0, r122) r123 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r123, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) ioctl$sock_FIOGETOWN(r123, 0x8903, &(0x7f0000002d00)=0x0) r125 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r125, 0x0) write$P9_RWALK(r125, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r126 = dup2(r125, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r126, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r128 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r128, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r129) r130 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r130, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r131) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r133 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r133, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r134, 0x0) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r136 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r126, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r127}, {0x2, 0x7, r129}, {0x2, 0x6, r131}, {0x2, 0x6, r132}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r134}, {}, {0x8, 0x0, r135}, {0x8, 0x2}, {0x8, 0x2, r136}, {0x8, 0x4, r137}], {}, {0x20, 0x4}}, 0x84, 0x2) r138 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r138, 0x0) write$P9_RWALK(r138, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r139 = dup2(r138, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r139, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r141 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r141, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r142) r143 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r143, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r144) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r146 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r146, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r147, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r150 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r150, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r151, 0x0) r152 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r139, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r140}, {0x2, 0x7, r142}, {0x2, 0x6, r144}, {0x2, 0x6, r145}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r147}, {0x8, 0x1, r148}, {0x8, 0x0, r149}, {0x8, 0x2, r151}, {0x8, 0x2, r152}, {0x8, 0x4, r153}], {}, {0x20, 0x4}}, 0x84, 0x2) r154 = syz_open_dev$audion(&(0x7f0000002d40)='/dev/audio#\x00', 0x1, 0x2000) r155 = socket$l2tp(0x18, 0x1, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r157 = socket$packet(0x11, 0x2, 0x300) r158 = fcntl$dupfd(r156, 0x0, r157) ioctl$PERF_EVENT_IOC_ENABLE(r158, 0x8912, 0x400200) sendmmsg$unix(r6, &(0x7f0000003240)=[{&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000300)="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", 0xfa}, {&(0x7f0000000400)="ab9b9ea712a4f30d438e75a3e647780421ddc80a8b398191f256629275439829e2d82dd4f7d0fb5efd20ffbb73e50a9801df07e2510387b57d426224c4f8c3be9c79ec72fdcdfe2bfefc4ac7c4d76ed4511cc9b42e05616b3a535c2fabdba72a756601f17683a1559e633369c63955ca186b899d6b0189a01bbbea7cbd24c4fd16234ba327a8c78dd96c66b84752f1a2a1d20207c5bf5f64ed9d219dc7ee4c5b1548b7191e55b56ec6cadd626c6a3f57e39ae795c8cb84ab0f75c5808465a10aef6493f257cb5be52a628b9d25f1a464567a7bd8efe09c2ce9abd2245c1a80623ba9e22ee220", 0xe6}, {&(0x7f0000000500)="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", 0x1000}], 0x3, &(0x7f0000001600)=[@rights={{0x20, 0x1, 0x1, [r8, r2, r10, r13]}}, @rights={{0x30, 0x1, 0x1, [r15, 0xffffffffffffffff, r16, r17, r3, r18, r20, r24]}}, @cred={{0x1c, 0x1, 0x2, {r25, r30, r39}}}, @rights={{0x34, 0x1, 0x1, [r2, r42, r45, r5, r5, r46, r2, r49, r51]}}, @cred={{0x1c, 0x1, 0x2, {r53, r59, r69}}}, @rights={{0x1c, 0x1, 0x1, [r71, r72, r75]}}, @rights={{0x1c, 0x1, 0x1, [r77, r78, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r82, r94}}}, @cred={{0x1c, 0x1, 0x2, {r95, r99, r100}}}], 0x148, 0x800}, {&(0x7f0000001780)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002c40)=[{&(0x7f0000000240)="84507ebaa2e44e84abffea12f0e7b5cabc8be3b4a9b40f4385087b99a2442bf2b7970f623e15cbba02a01933de2feee391c4707c0046943dd82cdd8a", 0x3c}, {&(0x7f0000001800)="e26acd1acb8dc2a674c8249318454174435c2be6d5444345c7e5247e3b92ca4d0397fda8cb853eba1bc7d95a667a683a5736e7a9391096c82d46326958f04a30176668a4c1b7b86970727fb5fb3873ee6970d731a3f1800a03a73b16449f6568ab15dbd117f1590495f9d18e5b4292b8fe25b0b6fc44f63ae424f00319c3a9a43856645211c8927932da5b200e20d107", 0x90}, {&(0x7f00000018c0)="fa8db972e5148a497ea60a76136ced392f07d2695f98791900ef6100e56fe357358ad1833f46fdc690987b7335feb5a6234e0a8acab3a83b1be7024211777215245768752e0cb4ecc5b99e365551d39934197089bccf9e127f22b9c23c2049e953615296a69918a67093952d9fe22992f78becb56c676685f6c4f854bb9f172dda8910a706420f63537d747d5118e891695d68e60f6273081514cac7c52803ad46f327665758842627ab636060df2fcf9f82", 0xb2}, {&(0x7f0000001980)="8055578396bf5d", 0x7}, {&(0x7f00000019c0)="c9cce38577610d", 0x7}, {&(0x7f0000001a00)="449b0e2b8251d915473a81947e9036449ee07a481f4835feea64bbd021d461e9e4e9de125d9a947b4cb754095bafd0dff17ad028dc2522062ba8be5c21b8ddef90e74cfa1286b70f644034c950ddce26d318eb232d60c6bf4d879bce35103b4636a36c973ee20c6dc2b1e25ba693446d786b5d5677277c9d4f4554a9d0ea5db1ec19e70894b15cbee5fb031147b4e0037c6c1147b9833558cd09b3bf0a0df2dc9c5e03a9ae1de546dff0d05205ae648043c063bef9657fb97391647d86c4baafb39bc8913fef95e87c6e5f2bb241fa7543652a480da3cb4513117729956aefa2b858f6ba7cc0121085", 0xe9}, {&(0x7f0000001b00)="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", 0x1000}, {&(0x7f0000002b00)}, {&(0x7f0000002b40)="f9c897c60e6f1be1e7361077b85225e110e39f72faa121a9d8c19761ed3f129cbe3e96b365b3ed359aae29357fc347e53a83c6ec5b75f0e090d2e9540d153652eed34fa084bf85806eb7eec2b41577ee5986d50b7642ea74ee53141241144771d0cfebd20c751c018793d77ae610906d588dd43798461a898b382ff3696dd286d92a4ec471f746eb7fc13dbe7ec9b73385a3f5d79bcc3ae49b7deedc04115f8ffd617682be5459e1b2e5dd6ab4b379dba427ab5843", 0xb5}, {&(0x7f0000002c00)="0e0217b2cc6055127f6e472cf5255b094dcd0b79af43447c1fad05dc78de25c05e65ad1ac2e84f0214487382ef71941ecde2a6a1e7", 0x35}], 0xa, &(0x7f0000002d80)=[@cred={{0x1c, 0x1, 0x2, {r101, r105, r117}}}, @rights={{0x1c, 0x1, 0x1, [r118, r119, r121]}}, @cred={{0x1c, 0x1, 0x2, {r124, r131, r153}}}, @rights={{0x20, 0x1, 0x1, [r154, 0xffffffffffffffff, r155, r158]}}], 0x80, 0x4800}, {&(0x7f0000002e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000031c0)=[{&(0x7f0000002e80)="b52ae62d073c81d1cfce1bddb1a09cedfcf18a1db68612fc0f2891372bbd62e86b34e26e6370ba3ba6c75a6ba8602089756de01215adf871c5d35fda8318aaac7ed028d3ab6fac0b52e4c970a0be3b8c9b2f0d9d31c70d53966473ce59fb5e04eb6977accbd88fc9976cfe11b811316e0003e4432acdcefdfd60a04d6546870042bf94ce5460d1c72228b0ea89d625a4b97024692ec300cb59ce7d95a448", 0x9e}, {&(0x7f0000002f40)="304dddf2e7e0cd3b057cb1ecea31870ab512b2504c7d14089a54585f1d9dfdaa1ef745a2a978d18bc97abb64c0d8a5c05fe8b92c002ec9abb0f8d95b962321613dee4cae2556c91583b54d3f01a918b3b0b3d20b32034909f77116", 0x5b}, {&(0x7f0000002fc0)="65d65ef84f638fc5e3eb5b2a4d567bf9986e396e1e49b02161b8888c87a63609f1d6a1d0f19514c4d3cfb3af05bbc53ab5de4d34deab58df64f9fe3dca6b8363d79b2e332a573c3b1d65d526b060e4edf9571ab0b0e1b28c50911a4c7063a77f922ed2ec9939f30faff5e7c7fe8c587168cb7c5411c31bba35fb56fb03111984ba6ca9ba274bcc1b2b91c5a303fb089ef4586da4717caa06b032e388ab76228714a2c163cae6c41f9f69c5a6351c1812c4db482b6c27d15930b97ea6e7baa66e9240", 0xc2}, {&(0x7f00000030c0)="bc4d116e7dcc861b9d9e95862e04149cfd3bb08e997fd9020cbe99c1c2cf4914d30b5085d4cc2c80ca15d640dce428d5f89e8d8213271ca82a6aaa12ab2e72651b8ac15d161154e9d3d2872c675a2cf0510cf9ad55e6453c34094f3bdfa0fca41edab112ea4750aad5666e7c669b4c7ebb79fb2e824f98d2b757ae0a1f4ff6e3ca8c345ed6ccf298f133c4b24e3a05470c21dfb38bf49891109f83a3243d47b8ed63835c1eadf7fd11ff957c84b9efa31f4bef1e", 0xb4}, {&(0x7f0000003180)="f2bcee40dd9dadebb7817e5660fc56c2a46331a2fa274dbccfd4443de0ff", 0x1e}], 0x5, 0x0, 0x0, 0x20000000}], 0x3, 0xc0804) [ 2392.558013] loop4: partition table beyond EOD, truncated [ 2392.578752] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xbd10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f00000000c0)={0x1, 0x9}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgid(0x0) ptrace$cont(0x7, r2, 0x4, 0xfffffffffffffff9) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r3, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="0208000000134c6a6850c1f9dd7e8472211a3a4fd4170b1d02"]) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) r12 = getgid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) r14 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r14, 0x0) write$P9_RWALK(r14, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r15 = dup2(r14, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r15, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r18) r19 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r20) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r22, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r23, 0x0) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r25 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r15, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r16}, {0x2, 0x7, r18}, {0x2, 0x6, r20}, {0x2, 0x6, r21}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r23}, {}, {0x8, 0x0, r24}, {0x8, 0x2}, {0x8, 0x2, r25}, {0x8, 0x4, r26}], {}, {0x20, 0x4}}, 0x84, 0x2) setgroups(0x6, &(0x7f0000000300)=[r7, r11, r12, r13, 0xffffffffffffffff, r25]) 07:57:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="9f79170000007447927740dadf49c34750939bee7dddefd73bc568e7b61379252192e21f11cc3917dd0a148d8e4e0658aeaf9cdeeea1f2eaa60f3851549151a6f1555efa2b045309800891b0ab4395cb957ad17e95b6da8e3f56dea910620f504be907a770c65d01140be0e8ad299853b7e8931ee7a5099218f3c34a48db18ae32303689cabd95a0ee32e3b151a014a428"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2392.737012] Dev loop4: unable to read RDB block 1 [ 2392.741945] loop4: unable to read partition table [ 2392.761180] loop4: partition table beyond EOD, truncated 07:57:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x44100, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2392.784204] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:30 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0705000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xbe10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2393.050099] Dev loop4: unable to read RDB block 1 [ 2393.061203] loop4: unable to read partition table [ 2393.077612] loop4: partition table beyond EOD, truncated 07:57:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x203, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r7, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4, 0x8, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r8, 0x8f548d93d215363, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r9}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r9, 0x100027, 0x10}, 0xfffffe8a) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r10, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$packet(0x11, 0x0, 0x300) fcntl$dupfd(r11, 0x0, r12) r13 = dup2(r7, r0) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r14 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = socket$packet(0x11, 0x2, 0x300) r17 = fcntl$dupfd(r15, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r19 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r18, 0x0, r19) r20 = fcntl$dupfd(r19, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) ioctl$KVM_TRANSLATE(r20, 0xc018ae85, &(0x7f0000000000)={0x6000, 0x2, 0x2, 0x2}) 07:57:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2393.095488] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xbf10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r1, 0x605, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) r4 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2393.211732] Dev loop4: unable to read RDB block 1 [ 2393.224403] loop4: unable to read partition table [ 2393.241079] loop4: partition table beyond EOD, truncated [ 2393.263619] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x4001fe) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000000)={0x81, 0x9, 0xfffffffe, 0xfffffffe}, 0x10) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x8042, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x200040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) accept4$packet(r9, &(0x7f0000000080), 0x0, 0x100000) 07:57:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:31 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0706000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0xffffffffffffffc6, 0x0, 0x2, 0xffffffffffff7fff}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000280)={r5, 0x72}) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r4, &(0x7f0000000300)={[{0x2b, 'cpu'}]}, 0x8254408859eb9ec1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x8, {{0x3, 0x5, 0x0, r6}}}, 0x28) 07:57:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r1, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x7, &(0x7f0000fff000/0x1000)=nil, 0x5) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x224080, 0x0) [ 2393.546675] Dev loop4: unable to read RDB block 1 [ 2393.565869] loop4: unable to read partition table [ 2393.592218] loop4: partition table beyond EOD, truncated 07:57:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc010010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2393.636622] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2393.756200] validate_nla: 10 callbacks suppressed [ 2393.756210] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2393.774658] Dev loop4: unable to read RDB block 1 [ 2393.783785] loop4: unable to read partition table [ 2393.789774] loop4: partition table beyond EOD, truncated [ 2393.813675] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10800, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xd) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$packet(r2, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_GET_REGS(r8, 0x8090ae81, &(0x7f0000000140)) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$cgroup(r9, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) 07:57:31 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0707000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2393.933403] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fanotify_mark(r6, 0x5c, 0x8001022, 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r7 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r9, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) recvfrom$inet(r9, &(0x7f0000000240)=""/239, 0xef, 0x10003, &(0x7f0000000380)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2394.105185] Dev loop4: unable to read RDB block 1 [ 2394.121496] loop4: unable to read partition table [ 2394.136968] loop4: partition table beyond EOD, truncated [ 2394.151657] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000140)={0x8, 0x8, 0x8, 'queue1\x00', 0x9}) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc110010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x40000000015, 0x80005, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r10}, 0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000000)={r10, 0x800}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000000c0)={0x101, 0x5a, 0x2, 0xb7c, 0x3, 0xe8a, 0x2, 0x5, r11}, &(0x7f0000000100)=0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_subtree(r6, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r7, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2394.304471] Dev loop4: unable to read RDB block 1 [ 2394.324099] loop4: unable to read partition table [ 2394.329183] loop4: partition table beyond EOD, truncated [ 2394.333994] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2394.362468] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:32 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0708000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc210010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) accept4$packet(r5, &(0x7f0000000040), 0x0, 0x100800) 07:57:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2394.627855] Dev loop4: unable to read RDB block 1 [ 2394.632930] loop4: unable to read partition table [ 2394.662881] loop4: partition table beyond EOD, truncated [ 2394.683739] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2394.697849] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000240)) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) r5 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockname$netlink(r5, &(0x7f0000000080), &(0x7f0000000140)=0xc) 07:57:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x40000000015, 0x80005, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={r5, 0x80000001, 0x7, 0x8, 0x7, 0x400, 0x200, 0xe3, {0x0, @in6={{0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100}}, 0x3, 0xcc5, 0x100, 0x18cf, 0x2aa}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r6, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2394.789294] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2394.805303] Dev loop4: unable to read RDB block 1 [ 2394.833778] loop4: unable to read partition table [ 2394.838948] loop4: partition table beyond EOD, truncated 07:57:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2394.889874] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc310010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:32 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0709000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c834) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2395.042489] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2395.134569] Dev loop4: unable to read RDB block 1 [ 2395.140827] loop4: unable to read partition table [ 2395.149755] loop4: partition table beyond EOD, truncated [ 2395.168182] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x2, &(0x7f0000000100)={{r2, r3+30000000}, {r4, r5+30000000}}, &(0x7f0000000140)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r9, 0x0, r10) r11 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r11, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r12, 0x0, r13) fcntl$dupfd(r7, 0xe09, 0xffffffffffffffff) r14 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r14, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r14, 0x0, 0x48a, &(0x7f00000001c0)={0x514, 0x6, 0x3}, 0xc) ioctl$sock_SIOCBRADDBR(r8, 0x89a0, &(0x7f0000000180)='team_slave_0\x00') fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r15 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r15, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) getsockopt$inet_int(r15, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) ioctl$sock_TIOCINQ(r6, 0x541b, &(0x7f0000000000)) 07:57:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc3ffffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2395.267894] Dev loop4: unable to read RDB block 1 [ 2395.286845] loop4: unable to read partition table [ 2395.309469] loop4: partition table beyond EOD, truncated [ 2395.329589] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0x11) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2395.359162] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$cgroup_subtree(r9, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r11 = gettid() ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x3c) ptrace$cont(0x18, r11, 0x0, 0x0) ptrace$setregs(0xd, r11, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r11, 0x0, 0x0) r12 = syz_open_procfs(r11, &(0x7f0000000240)='io\x00') r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r14 = open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r14, 0x8933, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r14, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r13, 0x4008642a, &(0x7f0000000140)={r15, 0x20}) ioctl$DRM_IOCTL_UNLOCK(r12, 0x4008642b, &(0x7f00000002c0)={r15, 0x12}) write$cgroup_subtree(r10, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:33 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0710000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc410010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000000)=0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r6, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r13, 0x0, r14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = socket$packet(0x11, 0x2, 0x300) r17 = fcntl$dupfd(r15, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = socket$packet(0x11, 0x2, 0x300) r20 = fcntl$dupfd(r18, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) io_submit(r5, 0x8, &(0x7f0000001800)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x3, r4, &(0x7f0000000140)="58cb4ff8e9f09b14ca2acf214a7737d5157fde3d00c77782e8a650d33866ff3b5343a89dd366fe61bb7daa40820d0ee6e0eeaa918ed726b2ebf1a2ae1f320fdba5fcd0b845e81d2eb36ef8eed2eeddbef3a87b71b421b2cf00d0a0156b3051b2419faacf1ef599c6b15c4da844515643faa95eb40566253db9c6bb0a566f6006205933f1335e4db6c812866e4ecddbf176b930349c699523a77a04bc44de1671a7c5df9af3172330d1749f2f96", 0xad, 0x5}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x4b, r6, &(0x7f0000000300)="45613c51dcca61cbda660f4ba7484e31788f2961befc63ec02244a452ffb3055171d995e3962c6b9705ce8525c2dd9291c1d81ad2057434a69a7946afc914ab5505296f3de867d1b4eba87ccd961df55ddb280bcf399c3ba01f5b7eb8a824e032822eeba0728067d4f3569a0408f93787ca80e3a67bb100ef83338665046002ce566e3a63c5733b7892330821121ac4c08d13b9d7156288d4b25828d4f101b", 0x9f, 0x6ea, 0x0, 0xa3329e45a9ea98b9}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x7f, r9, &(0x7f00000003c0)="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", 0x1000, 0x6}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x3, 0x1000, r1, &(0x7f00000013c0)="8794384ef0f4018ee5b29027cd043850a10141a544fbd82851d16dacaaadfcb5fec9a45f8a536bf593cf9a046dda5079ca4d57605a115b19a6d643bc3cac027de79fc7c8bd7ff272a587bf18f8e10186d821c55c3ed787afbdf4f5540be5a618812aa727a3ef75e8022f10ca4f37b4c739083f26d266c1a34e0e0d72ae9011ccf9bb167dfbc5e8a5", 0x88, 0x1}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x8, 0x7f, r1, &(0x7f00000014c0)="ac9547835303bfdc8c6a35757e408728ad460f940a15ec0f2934d25cee168749e85c7989687356ff54b5af6ed9cd610c34904f805663af824be03c0980278c3418f9382f7cb961794c85e5c5e312f48eccb45d8e0c4f096a3d1735ea6683", 0x5e, 0x2, 0x0, 0x1, r12}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x1, 0x5, r14, &(0x7f0000001580)="f7d6598b319d053e909f33fc8e9bc1eda223845b4a4e0140ee3a1487fb831e7c2aa92894ec33fb4d4235e740ef197fa58cc4add88bad2ed77d8a2ef27a015ce1339cf0ec2f3f70c9ea2fc3e42b8ad4bf45b8089de3e3858a035485dba5f76efe26a2580fe542", 0x66, 0x3, 0x0, 0x0, r17}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x5, 0x7, r4, &(0x7f0000001640)="22cdff89781332b5862b57e5fc9041219578ab194c325b243b2ce7c2757080bbb352924f7a08681691168cf3bc5a5a1bdf285f97b9c637e6d34f3af751139f888d7559bf3b3dfe2083567210484f574b1995cd2386d88389074504c8df964d2039bac269f4e7b59e81e3736f8e25ff600b9eba9141e0a2ee3d", 0x79, 0x800, 0x0, 0x0, r20}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x1, 0x2, r1, &(0x7f0000001700)="443c1f753d2dff8e527ec95d30536dd812095d925aaeb6d32132429d515c4da5c1f24e50873715ddd680eaaa989e63470a853bab1c63e54d9b6b344c8bc722ec07b6e8b2515768f2792ed5469058071e1dcd796d2f5ca8908eee500e1a526d70ee50a95df7bfb2f4d62ee69dc1312ffe800e4b43274cd6a3b70e996acf9b2916d6537aef9c4817c4145f5d67190e6c6d", 0x90, 0xfffffffffffffffb}]) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20008, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x200, 0x1) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="2b63707520d0676521dcbb4d9d558ea50e7955dc55cd27097acf215bdd0bd7d87c1d706f1222f44be4507a81dd27ac708cd0efef9347513227443cfae370a1e4d6e77f56ee94568bc3ca6f3b8037e4b7d15f5a589a7e67f168b749767325b03300742c17526fc6d4a8a8c7f0c6a3837edd5ae636a78639c1cdbb1a560fac64cb6169135ca7d88b2601533d280acdafd414c082c35203"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2395.547143] Dev loop4: unable to read RDB block 1 [ 2395.557309] loop4: unable to read partition table [ 2395.563134] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2395.581679] loop4: partition table beyond EOD, truncated [ 2395.609434] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r4, 0x0, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r6, 0x0, r7) r8 = dup2(r4, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) fcntl$setflags(r0, 0x2, 0x1) setsockopt$ax25_int(r3, 0x101, 0x4, &(0x7f0000000000)=0x10001, 0x4) [ 2395.715734] Dev loop4: unable to read RDB block 1 [ 2395.728004] loop4: unable to read partition table 07:57:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1f) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2395.769914] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2395.773028] loop4: partition table beyond EOD, truncated [ 2395.791972] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:33 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0714000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc510010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2396.010199] Dev loop4: unable to read RDB block 1 [ 2396.019727] loop4: unable to read partition table [ 2396.032242] loop4: partition table beyond EOD, truncated 07:57:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r2, 0x6, 0xf35de46746270add, &(0x7f0000000300)=""/226, &(0x7f0000000240)=0xe2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000000)) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r8 = socket$packet(0x11, 0x2, 0x300) r9 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet6_mtu(r10, 0x29, 0x17, &(0x7f0000000180)=0x1, 0x4) r11 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r11, 0x84, 0x16, &(0x7f0000000080)={0x4, [0x3, 0x7a6, 0x0, 0x200]}, &(0x7f0000000140)=0xc) r12 = socket$inet_tcp(0x2, 0x1, 0x0) r13 = fcntl$dupfd(r5, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) accept4$packet(r4, &(0x7f0000000040), 0x0, 0x0) 07:57:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x9, &(0x7f0000000080)=[{0x1, 0x94, 0x81, 0x3}, {0x4, 0x9, 0x1f, 0x80}, {0x4, 0x9d, 0x7f, 0x7}, {0x0, 0x5, 0x7, 0x7}, {0x1df3, 0x6, 0xd, 0x7}, {0x1, 0x9, 0x74, 0x1}, {0x2, 0x1, 0xeb, 0x6}, {0x8, 0x8, 0x1, 0x1}, {0xce, 0x60, 0x6, 0x28}]}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2396.056674] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2396.059659] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2396.175766] Dev loop4: unable to read RDB block 1 [ 2396.180753] loop4: unable to read partition table [ 2396.190636] loop4: partition table beyond EOD, truncated [ 2396.207671] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0723000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000000), 0x0, 0x40000, &(0x7f0000ff9000/0x4000)=nil, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) userfaultfd(0xc00) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r5, 0x4b4d, &(0x7f00000000c0)={0x6, 0x7}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000140)=0x1) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x4040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STOP(r8, 0x54a1) 07:57:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) r2 = accept4(r1, 0x0, 0x0, 0xc0800) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xffffff89}}, 0x400c814) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_PROBE_HOST(r6, 0x5385, &(0x7f0000000300)={0x1000, ""/4096}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r3, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$packet(r2, &(0x7f0000000040), 0x0, 0x0) 07:57:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc610010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2396.456308] Dev loop4: unable to read RDB block 1 [ 2396.469413] loop4: unable to read partition table [ 2396.480018] loop4: partition table beyond EOD, truncated 07:57:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000080)={0xffffffe1, 0x3, 0x6, 0x4, 0x1ff, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) fchdir(r1) 07:57:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) getsockname(r2, &(0x7f0000000380)=@can={0x1d, 0x0}, &(0x7f0000000300)=0x80) sendmsg$can_bcm(r3, &(0x7f0000000500)={&(0x7f0000000400)={0x1d, r4}, 0x10, &(0x7f00000004c0)={&(0x7f0000000440)={0x2, 0x20, 0x7, {0x0, 0x7530}, {0x77359400}, {0x4, 0x1, 0x1, 0x1}, 0x1, @can={{0x3, 0x1, 0x0, 0x1}, 0x3, 0x1, 0x0, 0x0, "17fcf83162b1e225"}}, 0x48}, 0x1, 0x0, 0x0, 0x9c2ac1ca2fb40a79}, 0x48000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) r6 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r6, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2396.509991] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2396.563625] net_ratelimit: 18 callbacks suppressed [ 2396.563633] protocol 88fb is buggy, dev hsr_slave_0 [ 2396.573774] protocol 88fb is buggy, dev hsr_slave_1 07:57:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) ioctl$SIOCX25GCALLUSERDATA(r4, 0x89e4, &(0x7f0000000140)={0x17, "d2f3a512404860b0cdf5d69443cc9a59ad44e6d8f3e1120e7987adf6c6ea0b68d1f7dc38491697b640f991daefe5d28fcdc3e696658ae3b69483f48aab21ac689c7aff65727e14c5b4ce0df1b560d5429578cc8093ed1c5ea5711f86e6dde5be74f78af973d27c6e5e7e7dd31ddb509fd412a2a5d6af8b104f662b2736efc64c"}) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000300)={0x7, {{0x2, 0x4e22, @broadcast}}, 0x0, 0xa, [{{0x2, 0x4e23, @local}}, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @empty}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e23, @rand_addr=0xffffffff}}]}, 0x590) [ 2396.634579] Dev loop4: unable to read RDB block 1 [ 2396.649256] loop4: unable to read partition table [ 2396.671008] loop4: partition table beyond EOD, truncated [ 2396.693097] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2396.723580] protocol 88fb is buggy, dev hsr_slave_0 [ 2396.728800] protocol 88fb is buggy, dev hsr_slave_1 07:57:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0742000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x9, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000080)="21982edb69dce4b7406bf1c74ff2efe8b95546b89c89d68009ed1ca9ed18f60e1d12e975cf5abbd43bc184a0fcd04158f38d7639d2481f8817266d3ce0fff2c44cc88d7f2885658c4a1257cf388e7b6545abedfcb9ab240933a8c941ba1d50b93ae2bb1acc996bc1d491b7bd9d1e2402f1575a745c535a57df10020a3cba8cff08855f9362a544378cbdc778e471a52883f54418c28c5d2d48840d99cf157a34c8957df284985a4d32e96f2ea259bd25f835385693cab93952d37cddcf5cabeb5a446c5cc30be45c8471d4eabe4d6f932f579b939b940679e45e7039d4ba4f1a85e45fbd6a08e4bafb08a87d29f258af54700e4fe3de301094") 07:57:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc710010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40050) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') r6 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r11, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delchain={0x40, 0x65, 0x100, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r11, {0xffe8, 0xfff1}, {0xd, 0x6}, {0xb, 0x8}}, [@TCA_CHAIN={0x8, 0xb, 0x8001}, @TCA_RATE={0x8, 0x5, {0x1, 0x2}}, @TCA_CHAIN={0x8, 0xb, 0x30}]}, 0x40}, 0x1, 0x0, 0x0, 0x8400}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000000)={0x5, 0xb10, 0x3, 0x0, 0x8, 0x9}) [ 2396.895475] Dev loop4: unable to read RDB block 1 [ 2396.941987] loop4: unable to read partition table 07:57:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat(r0, &(0x7f0000000300)='./file0\x00', 0x802100, 0xe2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r7, 0x0, r8) getsockopt$bt_hci(r7, 0x0, 0x3, &(0x7f00000004c0)=""/173, &(0x7f0000000280)=0xad) r9 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r9, 0x300, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x40000) [ 2396.974050] loop4: partition table beyond EOD, truncated [ 2396.999478] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2397.043573] protocol 88fb is buggy, dev hsr_slave_0 [ 2397.043660] protocol 88fb is buggy, dev hsr_slave_1 [ 2397.048751] protocol 88fb is buggy, dev hsr_slave_1 [ 2397.053824] protocol 88fb is buggy, dev hsr_slave_0 [ 2397.063822] protocol 88fb is buggy, dev hsr_slave_1 07:57:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2397.125314] Dev loop4: unable to read RDB block 1 [ 2397.130814] loop4: unable to read partition table [ 2397.158390] loop4: partition table beyond EOD, truncated 07:57:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc810010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2c0000, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000080)={0x44, 0x4, 0x4, 0x1000, 0x7fff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2397.174763] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000140)=0x71ab5f0c7c4b3cac, 0x4) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r3, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000180)={{0x1, 0x0, @reserved="195b950c14ee172c8a32ecbe3eee83af386e1d6d3a225f91d740cac32d7409aa"}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_out(r5, 0x5460, &(0x7f0000000000)) r6 = fcntl$dupfd(r4, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$packet(r2, &(0x7f0000000040), 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r7, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) getsockopt$EBT_SO_GET_INIT_INFO(r7, 0x0, 0x82, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000300)=0x78) 07:57:35 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0748000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000240)={0x1, 0x8, 0x9, 0x2, 0xde, 0x0, 0xff, 0x20, 0x6, 0xff, 0x2}, 0xb) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="7a0f3b487645a2"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xc910010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2397.419139] Dev loop4: unable to read RDB block 1 [ 2397.449042] loop4: unable to read partition table 07:57:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x2, 0x3, 0x7) recvmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000140)=@sco, 0x80, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/103, 0x67}, {&(0x7f0000000300)=""/85, 0x55}, {&(0x7f0000000380)=""/254, 0xfe}, {&(0x7f0000000480)=""/113, 0x71}, {&(0x7f0000000500)=""/186, 0xba}, {&(0x7f00000005c0)=""/81, 0x51}], 0x6}, 0xc0002000) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$packet(r2, &(0x7f0000000040), 0x0, 0x0) [ 2397.477841] loop4: partition table beyond EOD, truncated [ 2397.506661] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) clock_gettime(0x6, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000080)={{0x1, 0x0, @descriptor="36fed7240e0484d9"}, 0x52, [], "b8ccc9facf99c88ded3e1556841cd8a87fc99a6664a675c32c7009a06d349ad97a0f8d910509bfda95247eaaffc59628e6d43fe8a2af00dd0d2368cca61804bce404c3ed531a0637bf0aef18241458a9c4b6"}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000180)={{0x0, 0x7530}, {r2, r3/1000+30000}}, &(0x7f00000001c0)) 07:57:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xca10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:35 executing program 2: r0 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x1}, 0x0, 0xfffffffffffffffc, r0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) r6 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r6, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2397.624631] Dev loop4: unable to read RDB block 1 [ 2397.634051] loop4: unable to read partition table [ 2397.652041] loop4: partition table beyond EOD, truncated [ 2397.683077] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40, 0x0) ioctl$VT_RELDISP(r2, 0x5605) r3 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = ioctl$NS_GET_PARENT(r6, 0xb702, 0x0) r8 = fcntl$dupfd(r7, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$cgroup_int(r8, &(0x7f0000000000)=0xbd, 0x12) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:35 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff074c000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xcb10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0xc) 07:57:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB='6cpu '], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2397.931738] Dev loop4: unable to read RDB block 1 [ 2397.939705] loop4: unable to read partition table [ 2397.967317] loop4: partition table beyond EOD, truncated 07:57:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2397.983873] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e23, 0x4, @remote, 0x4}, {0xa, 0x4e24, 0x1, @mcast1, 0x401}, 0x2, [0x7, 0x4, 0x7, 0x9, 0xb1, 0x4, 0xd9e6, 0x2]}, 0x5c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xcc10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2398.097564] Dev loop4: unable to read RDB block 1 [ 2398.108692] loop4: unable to read partition table [ 2398.122477] loop4: partition table beyond EOD, truncated 07:57:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r5) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2398.156522] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r5, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) readv(r5, &(0x7f0000000800)=[{&(0x7f0000000240)=""/96, 0x60}, {&(0x7f00000002c0)}, {&(0x7f0000000300)=""/37, 0x25}, {&(0x7f0000000380)=""/135, 0x87}, {&(0x7f0000000440)=""/187, 0xbb}, {&(0x7f0000000500)=""/147, 0x93}, {&(0x7f00000005c0)=""/138, 0x8a}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000700)=""/213, 0xd5}], 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r6 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UI_GET_SYSNAME(r9, 0x8040552c, &(0x7f00000002c0)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r6, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:36 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0760000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xcd10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f0000000300)) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2398.434179] Dev loop4: unable to read RDB block 1 [ 2398.439248] loop4: unable to read partition table 07:57:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x5}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2398.476214] loop4: partition table beyond EOD, truncated [ 2398.502313] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2398.613271] Dev loop4: unable to read RDB block 1 07:57:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xd9) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [{{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8040081}, 0x8014) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000080)) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$packet(r3, &(0x7f0000000040), 0x0, 0x0) [ 2398.634435] loop4: unable to read partition table [ 2398.643654] protocol 88fb is buggy, dev hsr_slave_0 [ 2398.649380] loop4: partition table beyond EOD, truncated [ 2398.654994] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:36 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0768000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xce10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2398.874051] Dev loop4: unable to read RDB block 1 [ 2398.881213] loop4: unable to read partition table [ 2398.893783] validate_nla: 12 callbacks suppressed [ 2398.893793] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2398.897679] loop4: partition table beyond EOD, truncated [ 2398.953586] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2399.001876] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2399.085197] Dev loop4: unable to read RDB block 1 [ 2399.092948] loop4: unable to read partition table [ 2399.106099] loop4: partition table beyond EOD, truncated 07:57:36 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x210000, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000140)={0x208d, 0x1, 0x4, 0x10, {0x0, 0x2710}, {0x1, 0x1, 0x3, 0x2, 0x81, 0x3f, "a85c50ea"}, 0x336, 0x5, @fd, 0x4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x40000000015, 0x80005, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r10}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000340)={r10, 0x47, 0x30}, &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=r11, &(0x7f0000000400)=0x4) r12 = socket$packet(0x11, 0x2, 0x300) r13 = fcntl$dupfd(r1, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r13, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r14, 0x0, 0x70bd2a, 0x7fffffff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x309}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r16 = accept4(r15, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r16, &(0x7f0000000100)={0x0, 0xfffffffffffffcdd, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c814) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = socket$inet_tcp(0x2, 0x1, 0x0) r19 = fcntl$dupfd(r17, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) accept4$packet(r16, &(0x7f0000000040), 0x0, 0x0) 07:57:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xcf10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2399.137948] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2399.182452] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:37 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff076c000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="7ddf00000000166c89510bf6e80e6f11f6f55df0372fb9a061c71b498c9e01acf1624d06000000d0b015cd"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r6, 0x4, 0x70bd26, 0x25dfdbfe, {}, [{{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x3c}}, 0x10000040) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f0000000000)=r1) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd010010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2399.429148] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2399.446578] Dev loop4: unable to read RDB block 1 [ 2399.499515] loop4: unable to read partition table 07:57:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r2, &(0x7f00000007c0)={&(0x7f0000000240)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e20, 0x2}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000380)="876ead526506ed90089dc492bbbb8e3b58d08a04742fa7eaae8961ba6848cbda6f7fc301515e8bb47520a24584ca3098f72d0ab859e04e5c39f681887e2f03032467299e568e9abbc31affcb5cf22b41d4b685180967d3c085c66714570ce25efdc2164539a1881070942332e7689d7fb47da616caf97ee7c1631ee3ad75ee5b368de23521ebcd39542184cc35c35df6634b02d19e051c3e70939f902bfa50cae5f865f564475afa4b72f2e77620bfb932f57af40ad24d17ad84269b3d057c50b638d62003a632bf85de2ead217eba960f4545c4d543d243f23f4c", 0xdb}, {&(0x7f00000002c0)="25909b7b2290c2a7454efe46c16ac4ca20667c11fb6e3583da7b87978b59b81e32c5307c6a3caf11bf3203bcf497366577d3572a5a3860fb2e7dbca2452e3a49a763f319222b42b22c1c5f1c950fbbbfc9c0c1f6243c683c067e7dbcb554c98d5c7ced", 0x63}, {&(0x7f0000000480)="36be1c599280c0f446a8fde0b7d4c97ce3dcf998985aa0dc37646828d7fde25c32393fcd165f057cc3d40dc756d708721868e31ad87b0660a8d1c9850e6f1294d8022bbc32319425143be0be1253a425a0dd56be089cc8f7776f29ba40542eeb2fbcacf68b77", 0x66}], 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/600], 0x258}, 0x4050) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2399.525496] loop4: partition table beyond EOD, truncated [ 2399.534793] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x10c, r1, 0x20, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x4, @rand_addr="f43ddd811f0b800ad0ae8ba82ec5f04f"}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3, @mcast2, 0x101}}}}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x30040800}, 0x4010840) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x417500, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000380)={"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"}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f0000000080)=""/104) 07:57:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd110010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000022c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002180)=[{{&(0x7f0000000080)=@generic, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000140)=""/3, 0x3}, {&(0x7f0000000180)=""/46, 0x2e}], 0x3, &(0x7f0000001300)=""/158, 0x9e}, 0x7}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000200)=""/52, 0x34}], 0x1}, 0x3}, {{&(0x7f00000013c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001500)=[{&(0x7f0000002880)=""/118, 0x76}, {&(0x7f00000014c0)=""/8, 0x8}], 0x2, &(0x7f0000001540)=""/235, 0xeb}, 0x5}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001640)=""/234, 0xea}, {&(0x7f0000001740)=""/104, 0x68}, {&(0x7f00000017c0)=""/200, 0xc8}, {&(0x7f00000018c0)=""/13, 0xd}, {&(0x7f0000001900)=""/216, 0xd8}, {&(0x7f0000001a00)=""/135, 0x87}], 0x6, &(0x7f0000001b40)=""/212, 0xd4}, 0xffff}, {{&(0x7f0000001c40)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002000)=[{&(0x7f0000002740)=""/260, 0x104}, {&(0x7f0000001dc0)=""/240, 0xf0}, {&(0x7f0000001ec0)=""/67, 0x43}, {&(0x7f0000001f40)=""/8, 0x8}, {&(0x7f0000001f80)=""/102, 0x66}], 0x5, &(0x7f0000002080)=""/240, 0xf0}, 0x1ff}], 0x5, 0x40000000, &(0x7f0000002300)={r2, r3+10000000}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) write$P9_RWALK(r7, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r8 = dup2(r7, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r15, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r19, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r20, 0x0) r21 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r8, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r9}, {0x2, 0x7, r11}, {0x2, 0x6, r13}, {0x2, 0x6, r14}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r16}, {0x8, 0x1, r17}, {0x8, 0x0, r18}, {0x8, 0x2, r20}, {0x8, 0x2, r21}, {0x8, 0x4, r22}], {}, {0x20, 0x4}}, 0x84, 0x2) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r24) r25 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r25, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) fstat(r25, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002440), &(0x7f0000002480)=0x0, &(0x7f00000024c0)) r28 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r28, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) fstat(r28, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r30 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r30, 0x0) write$P9_RWALK(r30, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r31 = dup2(r30, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r31, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r33 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r34) r35 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r35, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r36) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r38 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r38, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r39, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r42, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r43, 0x0) r44 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r31, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r32}, {0x2, 0x7, r34}, {0x2, 0x6, r36}, {0x2, 0x6, r37}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r39}, {0x8, 0x1, r40}, {0x8, 0x0, r41}, {0x8, 0x2, r43}, {0x8, 0x2, r44}, {0x8, 0x4, r45}], {}, {0x20, 0x4}}, 0x84, 0x2) r46 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r46, 0x0) write$P9_RWALK(r46, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r47 = dup2(r46, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r49 = socket$packet(0x11, 0x2, 0x300) r50 = fcntl$dupfd(r48, 0x0, r49) ioctl$PERF_EVENT_IOC_ENABLE(r50, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r50, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0x4ca) r52 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r52, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r53) r54 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r54, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r55) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r57 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r57, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r58, 0x0) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r60 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r47, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r51}, {0x2, 0x7, r53}, {0x2, 0x6, r55}, {0x2, 0x6, r56}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r58}, {}, {0x8, 0x0, r59}, {0x8, 0x2}, {0x8, 0x2, r60}, {0x8, 0x4, r61}], {}, {0x20, 0x4}}, 0x84, 0x2) r62 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r62, 0x0) write$P9_RWALK(r62, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r63 = dup2(r62, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r63, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r65 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r65, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r67 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r67, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r68) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r71 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r70, 0x0, r71) fstat(r57, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r72, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r75 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r75, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r76, 0x0) r77 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r63, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r64}, {0x2, 0x7, r66}, {0x2, 0x6, r68}, {0x2, 0x6, r69}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r72}, {0x8, 0x1, r73}, {0x8, 0x0, r74}, {0x8, 0x2, r76}, {0x8, 0x2, r77}, {0x8, 0x4, r78}], {}, {0x20, 0x4}}, 0x84, 0x2) lstat(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r80 = getgid() r81 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r81, 0x0) write$P9_RWALK(r81, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r82 = dup2(r81, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r82, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r84 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r84, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r85) r86 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r86, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r87) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r89 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r89, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r90, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r93 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r93, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r94, 0x0) r95 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r82, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r83}, {0x2, 0x7, r85}, {0x2, 0x6, r87}, {0x2, 0x6, r88}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r90}, {0x8, 0x1, r91}, {0x8, 0x0, r92}, {0x8, 0x2, r94}, {0x8, 0x2, r95}, {0x8, 0x4, r96}], {}, {0x20, 0x4}}, 0x84, 0x2) r97 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r97, 0x0) write$P9_RWALK(r97, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r98 = dup2(r97, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r98, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r100 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r100, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r101) r102 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r102, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r103) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r105 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r105, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r106, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r109 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r109, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r110, 0x0) r111 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r98, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r99}, {0x2, 0x7, r101}, {0x2, 0x6, r103}, {0x2, 0x6, r104}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r106}, {0x8, 0x1, r107}, {0x8, 0x0, r108}, {0x8, 0x2, r110}, {0x8, 0x2, r111}, {0x8, 0x4, r112}], {}, {0x20, 0x4}}, 0x84, 0x2) getgroups(0x6, &(0x7f0000002640)=[0xee00, r96, 0xee00, 0xee00, 0xee01, r112]) setxattr$system_posix_acl(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)='system.posix_acl_default\x00', &(0x7f0000002680)={{}, {0x1, 0x2}, [{0x2, 0x24a99a7fcb1157a9}, {0x2, 0x1, r14}, {0x2, 0x1, r24}, {0x2, 0x2, r26}], {0x4, 0x6}, [{0x8, 0xa26d14fc30fa978d, r27}, {0x8, 0x1, r29}, {0x8, 0x1, r39}, {0x8, 0x2, r60}, {0x8, 0x4, r76}, {0x8, 0x0, r79}, {0x8, 0x7, r80}, {0x8, 0x1, r113}], {0x10, 0x2}}, 0x84, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2399.665619] Dev loop4: unable to read RDB block 1 [ 2399.677990] loop4: unable to read partition table 07:57:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2399.705880] loop4: partition table beyond EOD, truncated [ 2399.736620] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2399.757193] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:37 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0774000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'veth0_to_team\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000080)={@local, @initdev={0xac, 0x1e, 0x1, 0x0}, r6}, 0xc) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000004c0)={@empty, @remote, @loopback, 0x3, 0x9, 0x80, 0x200, 0x0, 0x20, r8}) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$VIDIOC_G_OUTPUT(r4, 0x8004562e, &(0x7f0000000300)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r9, 0x84, 0x6b, &(0x7f00000002c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r12, 0x40086602, &(0x7f0000000240)=0x20010052) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffff2e) r4 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r4, &(0x7f0000000040), 0x0, 0x0) 07:57:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd210010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2399.966896] Dev loop4: unable to read RDB block 1 [ 2399.982163] loop4: unable to read partition table [ 2399.993766] loop4: partition table beyond EOD, truncated [ 2399.999502] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2400.074012] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r3 = dup2(r2, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r11, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r14, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r15, 0x0) r16 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r3, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r4}, {0x2, 0x7, r6}, {0x2, 0x6, r8}, {0x2, 0x6, r9}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r11}, {0x8, 0x1, r12}, {0x8, 0x0, r13}, {0x8, 0x2, r15}, {0x8, 0x2, r16}, {0x8, 0x4, r17}], {}, {0x20, 0x4}}, 0x84, 0x2) fchown(r0, r4, 0xee01) r18 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000680)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r18, 0x80082102, &(0x7f0000000200)=r19) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2400.145419] Dev loop4: unable to read RDB block 1 [ 2400.152860] loop4: unable to read partition table [ 2400.160994] loop4: partition table beyond EOD, truncated [ 2400.171652] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2400.190608] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd310010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x80002) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000080)) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:38 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff077a000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2400.313048] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r7}, @IFLA_GRE_FWMARK={0x8, 0xc00e, 0x10}]]}}}]}, 0x48}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000080), 0x0, 0x7fff, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd410010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2400.448464] Dev loop4: unable to read RDB block 1 [ 2400.460486] loop4: unable to read partition table [ 2400.474639] loop4: partition table beyond EOD, truncated [ 2400.480148] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x101000) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0x1}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000140)='nodevnodevcpuset\x00', 0x11) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x6, @local}, 0x28, {0x2, 0x4e22, @broadcast}, 'batadv0\x00'}) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r4, 0xc034564b, &(0x7f0000000200)={0x8000, 0x35315258, 0x2750, 0x5, 0x1, @discrete={0x9, 0x6}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f0000000300)={0x8, @dev={[], 0x20}}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000240)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @window={0x3, 0x3, 0x1f}], 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_CAPBSET_READ(0x17, 0x1e) accept4$packet(r2, &(0x7f0000000040), 0x0, 0x0) 07:57:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x40000, 0x4, 0x0, [], &(0x7f0000000000)={0x9b0960, 0x9, [], @ptr=0x51a7}}) write$UHID_CREATE2(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/445], 0x1b4) [ 2400.539913] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2400.635457] Dev loop4: unable to read RDB block 1 [ 2400.648286] loop4: unable to read partition table [ 2400.656845] loop4: partition table beyond EOD, truncated [ 2400.668374] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:38 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07f0000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2400.719564] netlink: 'syz-executor.2': attribute type 14 has an invalid length. 07:57:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd510010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x60a6caa7f391e6da}, 0x1, 0x0, 0x0, 0x44}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r4, 0x0, r5) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r4, 0x8000}], 0x1, &(0x7f0000000300)={r6, r7+30000000}, &(0x7f0000000340)={0x3}, 0x8) r8 = fcntl$dupfd(r2, 0x0, r3) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x14002, 0x0) write$P9_RUNLINKAT(r9, &(0x7f0000000100)={0x7, 0x4d, 0x1}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, &(0x7f0000000140)="c9461a7e212a2b4570ed5699f431ca39c0d8619067fc5425523bcc812742301e819a3423ac8ae2bbff6711a235a343ee2e926e5d43b334b0509780b35f59bb211dabe79b4b", 0x45) 07:57:38 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x1, 0x4440) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000440)={0xc, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2b09, 0xfc93fa1145327718) ioctl$USBDEVFS_DISCSIGNAL(r3, 0x8010550e, &(0x7f0000000140)={0x8, &(0x7f0000000080)="731c0b771a8bc916b3d34d0d2d6c8adc04ce4fb38d934ecbbc26b9d2b4d80250d531da407b2901b54006cc6ee6707f6e627583f3f6e1e4969adc49f09da580b0932465e23175ad2bb73a0e41cef53f920700123490a077b76136217cf2bfcba77c99b5da26af8628d04046a7cf93cbf3d6be9f21c6411b2bde63fe636d9ea26aa29961fa1fc9c2a398831744007e1d5afa8e9833a7b3"}) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0xfff, 0x400000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x1, 0x2) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r11, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000015c0)={'vcan0\x00', r11}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000380)={{0x3, 0x6}, {0x2, 0x7f}, 0x1, 0x1, 0x1}) sendmsg$can_raw(r6, &(0x7f00000016c0)={&(0x7f0000001600)={0x1d, r12}, 0x10, &(0x7f0000001680)={&(0x7f0000001640)=@can={{0x3}, 0x1, 0x3, 0x0, 0x0, "55a35a4aacf93da4"}, 0x10}, 0x1, 0x0, 0x0, 0x20}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2400.888185] Dev loop4: unable to read RDB block 1 [ 2400.900233] loop4: unable to read partition table [ 2400.914881] loop4: partition table beyond EOD, truncated [ 2400.938960] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r0, 0x0, r1) getsockname(r1, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000002c0)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) eventfd(0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r6, 0x0, r7) r8 = fcntl$dupfd(r6, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000180)) r9 = openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r5, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x5) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3c) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r10, 0x0, 0x0) ptrace$getenv(0x4201, r10, 0x204, &(0x7f0000000300)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2401.064626] Dev loop4: unable to read RDB block 1 [ 2401.069812] loop4: unable to read partition table [ 2401.100913] loop4: partition table beyond EOD, truncated 07:57:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r2, 0x0, r3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x46f3651f6661892a, 0x0) getsockopt$inet_udp_int(r4, 0x11, 0xa, &(0x7f0000000080), &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r5, 0x0, r6) r7 = fcntl$dupfd(r2, 0x80c, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2401.121483] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:39 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07e2010000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd610010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$revoke(0x3, 0x0) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_S_INPUT(r5, 0xc0045627, &(0x7f0000000240)=0x8b1c) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) mq_notify(r3, &(0x7f0000000080)={0x0, 0x2e, 0x0, @tid=r4}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x81400) [ 2401.409870] Dev loop4: unable to read RDB block 1 [ 2401.447422] loop4: unable to read partition table [ 2401.496460] loop4: partition table beyond EOD, truncated 07:57:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd710010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2401.549965] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4) 07:57:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40080422}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x100, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x2000b081) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x2, @loopback, 0x10000}, @in6={0xa, 0x4e26, 0x1000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e24, 0x6, @mcast1}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e20, 0x200, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}, 0x1}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e23, 0xfffffffd, @loopback, 0x5}, @in={0x2, 0x4e20, @multicast2}], 0xcc) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$packet(r3, &(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_PACK_ID(r6, 0x227c, &(0x7f0000000000)) 07:57:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r6, 0x0, r7) fcntl$F_GET_FILE_RW_HINT(r6, 0x40d, &(0x7f0000000240)) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2401.723963] Dev loop4: unable to read RDB block 1 [ 2401.728896] loop4: unable to read partition table [ 2401.743784] loop4: partition table beyond EOD, truncated [ 2401.755312] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:39 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700030000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd810010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x81400) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SG_SET_COMMAND_Q(r7, 0x2271, &(0x7f0000000000)=0x1) 07:57:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2402.034691] Dev loop4: unable to read RDB block 1 [ 2402.043819] loop4: unable to read partition table [ 2402.071560] loop4: partition table beyond EOD, truncated 07:57:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2402.131564] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xd910010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, r6, 0xb03, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14}]}, 0x340}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x340101}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xec, r6, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffff800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff38}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x88f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffff8}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x40}, 0x20000900) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCLINUX2(r7, 0x541c, &(0x7f0000000080)={0x2, 0xfffd, 0x400, 0x4, 0xe9, 0x8}) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0xfffffffffffffdfe, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x6370cbdb19141a80}, 0x400c890) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2402.285427] Dev loop4: unable to read RDB block 1 [ 2402.290794] loop4: unable to read partition table [ 2402.323015] loop4: partition table beyond EOD, truncated [ 2402.352188] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:40 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0719030000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0xbd0939d2c8468121, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xda10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x9, 0xa86a}, 0x2d}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) [ 2402.605083] Dev loop4: unable to read RDB block 1 [ 2402.613733] loop4: unable to read partition table 07:57:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2402.673408] loop4: partition table beyond EOD, truncated [ 2402.743652] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000080)={0x990000, 0x80000001, 0x3d, [], &(0x7f0000000000)={0x990968, 0xffff7fff, [], @ptr=0x1}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x5, &(0x7f0000ffd000/0x1000)=nil, 0x4) 07:57:40 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r6, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000003c0)=@security={'security\x00', 0xe, 0x4, 0x490, 0x0, 0x280, 0x0, 0x0, 0x138, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x4, &(0x7f0000000380), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x13}, @multicast1, 0x0, 0xffffff00, 'ip6erspan0\x00', 'nr0\x00', {}, {}, 0x2b, 0x2, 0x10}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xd, 0x20, 0x4, 0x1}}, @common=@inet=@set3={0x50, 'set\x00', 0x3, {{0x800, 0xd3, 0x1}, {0x5, 0x2301}, {0x3f, 0x2}, 0x6}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x4, 0x2}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, 0xff000000, 0xff000000, 'vcan0\x00', 'vxcan1\x00', {0x7f}, {0xff}, 0x62, 0x2, 0x3ac0895e654a51d3}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x0, 0x6, 0x1, 0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x81, [0x5, 0xe6, 0xffffffff, 0x6, 0x8, 0xfffffffb], 0x4, 0x9}, {0x1, [0x101, 0x2, 0x7, 0x4, 0x1, 0x6c65], 0x2}}}}, {{@ip={@multicast1, @empty, 0x1fffffe00, 0x0, 'team_slave_1\x00', 'ip6gre0\x00', {}, {0x17e}, 0x0, 0x2, 0x41}, 0x0, 0x118, 0x178, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x3, 0x33, 0x20, 0x1}}, @common=@inet=@hashlimit1={0x58, 'hashlimit\x00', 0x1, {'hwsim0\x00', {0x10, 0x5, 0x2, 0x6, 0x4a3b, 0x3, 0x5, 0x8, 0x40}, 0x5}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0xffff, 0x0, [0x3b, 0xa, 0x17, 0x5, 0x3c, 0x2f, 0xe, 0x38, 0x17, 0x1b, 0x2, 0x30, 0x2a, 0x8, 0x34, 0x5], 0x3, 0x1, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4f0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) epoll_pwait(r7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x400, &(0x7f0000000300)={0x2}, 0x8) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2402.803619] net_ratelimit: 19 callbacks suppressed [ 2402.803627] protocol 88fb is buggy, dev hsr_slave_0 [ 2402.813752] protocol 88fb is buggy, dev hsr_slave_1 07:57:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xdb10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2402.861079] Dev loop4: unable to read RDB block 1 [ 2402.876675] loop4: unable to read partition table [ 2402.909342] loop4: partition table beyond EOD, truncated [ 2402.938174] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f0000000080)={0x3, 0x9, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000000)=0xf3, 0x4) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000140)=0x1000000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2402.963600] protocol 88fb is buggy, dev hsr_slave_0 [ 2402.968938] protocol 88fb is buggy, dev hsr_slave_1 07:57:40 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0780040000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xdc10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r5, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) sync_file_range(r5, 0x8001, 0x3, 0x4e0e92c46a455779) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x402000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) recvmsg(r8, &(0x7f00000005c0)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)=""/253, 0xfd}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)}], 0x3, &(0x7f00000004c0)=""/234, 0xea}, 0x100) r10 = socket(0x40000000015, 0x80005, 0x0) close(r10) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r11, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r10, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r12}, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000600)={r12, 0x1ff}, 0xc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2403.244459] Dev loop4: unable to read RDB block 1 [ 2403.251854] loop4: unable to read partition table [ 2403.263997] loop4: partition table beyond EOD, truncated [ 2403.270993] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2403.283593] protocol 88fb is buggy, dev hsr_slave_0 [ 2403.283598] protocol 88fb is buggy, dev hsr_slave_0 07:57:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0xfff, 0xa3, 0x0, 0x156}, {0x3, 0x1f, 0xca, 0x80}, {0x0, 0x0, 0x20, 0x401}, {0x3ff, 0x7f, 0x3f, 0x400}]}, 0x10) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2403.283680] protocol 88fb is buggy, dev hsr_slave_1 [ 2403.288726] protocol 88fb is buggy, dev hsr_slave_1 [ 2403.294138] protocol 88fb is buggy, dev hsr_slave_0 [ 2403.309253] protocol 88fb is buggy, dev hsr_slave_1 07:57:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xdd10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2403.414968] Dev loop4: unable to read RDB block 1 [ 2403.436868] loop4: unable to read partition table 07:57:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) syz_extract_tcp_res(&(0x7f0000000000), 0xfffffffc, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2403.468048] loop4: partition table beyond EOD, truncated [ 2403.509449] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f0000000080)={0xab, 0x80, 0x6, 'queue1\x00', 0x8}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r7 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x800, 0x0) ioctl$FS_IOC_FSGETXATTR(r8, 0x801c581f, &(0x7f00000001c0)={0x3, 0x8, 0x0, 0x7, 0x1}) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c80, 0x0) r10 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r10) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r10) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000140)) 07:57:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700050000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xde00000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2403.772064] Dev loop4: unable to read RDB block 1 07:57:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) r9 = semget$private(0x0, 0x1, 0x0) semctl$SETALL(r9, 0x0, 0x14, &(0x7f0000000080)) semctl$IPC_STAT(r9, 0x0, 0x2, &(0x7f0000000240)=""/3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="6b635ce17a08f1707620"], 0x5) sendmsg$kcm(r0, 0x0, 0x4059) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r10, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) fgetxattr(r10, &(0x7f0000000280)=@random={'btrfs.', '/dev/dlm_plock\x00'}, &(0x7f00000002c0)=""/31, 0x1f) 07:57:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x800, 0x800) sendmsg$xdp(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f00000000c0)="ff4c0b13d0e503c49a6586dd4efb24fd5ef416c622877090764299817c", 0x1d}, {&(0x7f0000000100)="e5bf63bc4c5975dcd893d0663aec0046b5d2421948dd25102537f8f1af539fe8126e22b9b1e0f2aa01aadfa18a641f917758508b5dc4bb4a3ab77f9ec4be006d2f68ddedb5da697c2c9464ee1d7436fd2513c63d00e7", 0x56}, {&(0x7f0000000180)="2d52d362e2a50b91fb330ae37cd3ef68d4d2816b440be5adef0ed8c66328bce4f073", 0x22}, {&(0x7f00000001c0)="ff3377386cc9610897f621fe2112f2e2c34c6bbd46e69494718c4269", 0x1c}, {&(0x7f0000000200)="aefe3814287cdf8836c0a6c8af05c6862df9155b06ca0368374586fce1ba855fedd92de5c83a3b62e42d79a6118845bde102339dfc82be6336aa97e920ada14e6fcfa8887142122ad2541f4957a04f344a8556f9323c40043010ee7c2b6f86de9e8a03925753efe0d075cb31f0854c055c7c3d5e5f758fac16f36c41fb140445ed77c73d7af5098871837031abf20eee283f24f8d90194ccc58670c1ef84f8cb6a5f17031d285a8dded3c1f792585eee6a1d7bc3e07a1f15f9c05cf66299e1e18548090bc6a146e2b768d0e059951ba53fdac47776b1475f9f4320b7a607fcd51623b78f69ea2fc089f7dd46edf1ad818aade7e66c34cd51b119535a204bb597bd39688c54ccfa0b3209f0e4a1f13e3b1244b3d42c986aadd1aaf2fa1f3a54555e6ab10b95d3d0538358be2bcf5e06d8bdd55128c28b46f6998f9f46f0a89178c5a3c5fc1306cf7ba09544d1a36f6697a58c708a07a7f29f611efb082408e39e96a805de540064ea95ce72ada45cf720c197ce25bc9bb8f8544c8abad1da7d41d7a26829b03555f7dbf781e80a231f183c7342af797403131f73cf374d8de6f607463e7104edd27acf8920d547ccd2f3ef68bd0b1ae34be1fe6f49049114d43b68c1023b269dc6798ad698f0c6c8d3cde2ccfedb4ee0e92407c88d07d94a456f4427ec329a2f6228524944ca97489261f5a79a0fe0f548f47cd33295c58bb66c81f7dd50c35aeaa7ba2d46e8be0f6929ceba5f7b5291cce25d092c1e37745320e11ed6af08367ce781c112c6cca0a698604417a1196e9a337c3f3dae9fda2d22d8f14c8a958cec4f8d8fb19e68029a733c110e8242f99b63ec2dd8aecdeaa21596dda19906e62f286008e7ab0eeb8e1197ab040ba958699c301bca536829bce4f9ef7d975ff8fd9c25cef29c4216985e440a4064ab6e998ba273e0a295ab728fe8e5fcb3f18b9fd6673fbd26d89dc2317b5e3f71ad44f2028bbe054b45ceab707ef3fb155f09c41c57caa13a89dd1a30b7a61f62b0b649dd6cf7189404cb0ec144a90a79d057685ba778f938fae8396eae6920c6342ffb28aec30a344f8f13fcc10caab8383a8327c83ecbc5ed237a2089fdbbbdcae26fe3681624a8819ff0ef72d7c5261c9973844a2eea85b4521993fba5964c604f961b2aa178b9cdc976bcbb18d3818c492f232b5a862aa04d5cb8cfc0d8b9be62dd9d68e1e9d2e91d9a57ada49e624f3d05cd6ddd1279a00b26b5594ab1cd31719401d2520206e56240ed7b49b69adf79abedf5ee4799b26f027aba4b173f23a6ee972cc515e344d48f5d010a07536b7be93921e7458411fb43171b596f035ae32b00f46247e12fbb3c58da803d9471122f87d1fd6baaa83dee6c084c18b7b017011968e2847214061ff1d31fcfcf9706ae25d4eddf22b824e44a34875883edd46a88ce77af47c6e1de41b4edda24b406a9cbb1ce985200228303647e17c49c841c829612425dd9c25ee2e18c38e15b905cfaba0106eb70556dd2bc71b2130706bd7b4cd735c3cff9c25ebbe7d8317bc377e9656f6c0f02602a6b645628b376d43eacf75def4bb656baddafad109b14a80a97cbaec9a7e1534769110c20f1f41c1f62d79afb49edf42c07d32ff9b904ae5815c2e518cea78cfba13193ebd00979ad282d329de774df91db6b07d5adcb0ff57b26dd637de5de48cb6f108c494d06dfd666f996136eb411d9f4bdf276ea8a0b8b09db0d56ccbdccd403de8ce6ecdbaf5fa39c51d4d46521e85c85e478b0aeb427e75b7ec788ac6563fc13847b3d30925098b49074ce2ab3cc30313b4a0f8caad1c78b9e88e4881259a0f45e8868a6093489b71ade21ac9301f75f9477ce61a1734c374ccc3af3f3158901eee998a46dc8f2d2950bb67e16b27cc6ea836a706165f3451030ab096770c7dbae0c6077eb25ac70a3bb9f155cec770e0f61eef9fb06eac322dc6f307744db6b6ada7e848c73aeef564b47d142ba40d7333c8a67a06990c11faf9b078727ad697c5a089bca83b63b9fe6981d49b7ba04157719389dd882b35c3e35d097619b43c09410a8ad5e5d0faf4d9b8035f5700d73db8652d44cb37872361e95696a23a68b24e77e8cdede0be2f3b90dab481dba796b5f98c8a44eeb360343d6dfdc3374c4071e9f45e0edfc3ec29b170a676d0367eff6276ab337de38a1701242cf259f34952d3a8d9e330f6dcd4420e0edd9dd89d09a982eda32f561c31b0f189b4e0f17448ecf7a0956d1aa61d359e4c63558d185ef46c942b6d1f54e309bc94b39d449d857d4f830dca38cd7118a4a1c5da2ff63130a429df445c3a4de2219c16a8fd3abe50a7c92182d20fc9fcd1359d0134dc56bda7f4674b4dac7a0b5a4fe2cf3ea3a4248e3ec41c685efa95d65420f859af71d7f842ff2234aa146c389ad0de2b88b4c57e5953671fe1394efae470eacdfd53d1a40790c26b790a0e2e9470291fe67f7a6b5abe7afc25f2a4b9d3d9a1d5f8fd240934ec4f7da8980b4aedcdc088b82e50cc0f5d6ecd2aae3d5b14be308219017141b6cbe507a24a0e4e37a77fa4cb4f6d6fed1accdf1a75681eb378c18151f2039c696794166398a11f4e4cc66c475ab49f7d17784ca35293df775203388c7f342f76265d499320e38bde1dab9d40fb6819662f64646c478e467f97d741e586501a5c0bc7a2b715f24e3ea10bc2b68091c3fcc540f23e45071241020fe06a10c867ec8ca65f95aef92e39c5abefde56ad9a371190ac09146b76720c4167654aaa4add73252f630f810ce2d1dbe92fb6f08a530a096dfeab7a3af01bc1d43a685485ecf58594e6e430c3389b279875e59c98dee696371ff62e39d2a1e35cd89cf9810456d065f5e66b1734aa71677682a9cc44a8964dd72a7c96b68e1f180a4bb82e542a8332a087b7a364d8fa49c3139c472787c6d9e15a5d6d95487ebd6d307cb23b14a1e04103cbfec0fdd173cfd9dac18a4a25c341f463559129f45d1240e73ed46bdad880d0c08192be9e53aa7663923e45fa496354a189f2be541a9cb362035ce402fe8b7d6bbb48d99b20a4c93f3a0d9cf29476f914011bdc8998cc50037f772c1b6d33ff4690c7220384395718790d49974c6ccb4d45819f52c44ec2b331b59430f58f02d1003a1f50eefcd29a3d48a7abe2908ba432d2cd01d21a506b2a69a75633abd0cd0641a9090c829b101da76fd7955ed3b5665039d003ff239d81002a3442a12b507e1c91d087010d1b284510cf2f508bcccf483d0420e94e8afccb76ed40524353077794b997dccfca0171bb4a746bff72ac245f96e79da4c793e7f9e33fe3ef88f1edbe58652cd79bc770a610c7e2e5bdafd872c3da70f3d31fbdd9c7ce5b4d3f512361b2ac8b631cf69c43390576be3be54fc330b7652bb82a5e135dac836192e93172631f6a0a134f1e19c31d73e38c2f240a6afd12b865a8a1a1a3562d2818625de238c0f380ff8096ef68bebfc7cebde2da5a80037d768e9f6a832a7d40472b533d3c93bfb6ec29612a08ad4d1d5940a8016146654cfcf639004a62f892d9e2e3de8fb852bc1457efaa999488a2e31e085189732d5b02fcaa5dbf6d4447f1ff3c0c29ae5a9ccdc492a0c63d671ca1c28a6e0945d1ab57f89b6a40323ee198afa1241623d7d9d8edf6c4d4dbfbdc7e43134968f3f03145a707074021589cb2ab475bf80ccd2a3da67a7e21033612196b93c11b31022668902e410c06ae5e0ce24a49da3a6d2ac017c854179ee8c7e3e5ef3289bcf8439161211f75d98d3e61a0be3a0d03caf172efa214ed3f06e0df2821b02fc05fd6bc4e63b00a04114fe25d1cf58e2ac6fd89fff2c764f54a808da99c424f5b11eabfd3ec61b7e99f7059516c712e04f6770fa4d499a3f68f2eda49d9a747d94711ba391d6428941ab8c8922a3322061fa486fa832b94c16c1ca3f5cf6d775c08562b9b73fb07dd83cf33ba300be5c2ca45c41036319a2c38818d839e8ec078711dde7368d3964540382cdbe1eb4cf6286bd89090475cd0bde3246b7ca2f63084430432855d0870bcb8d2cfec2c45fb9f004efd16de9c9f051e0312e5275fe7305aab4dc0beb0d23e868035fd74581c4e1d4eadb0ed706c826b1d451f5e7ac388e8178b9eb5a469e24bdf6b8aa8ca568cb255132c6b93e1c8ffda95f055119aa882955ad99554d12e8fd2bce67a155ca7fb9e3ce47487ecf9deefcacfe0d00f2eaa1d37c9ba85b04279e1a11b4efecace2ed15c1715673ea7cb659924ad289330ae916dc82236375812080bbc3cc6a1d35a60d852d0819c77a6d7ecac852044ce754d289c3681c1f9748ef1d7f83e7add07d6c27adcb9c795427d16849a9be94040d4637ac96c176c7fbce0b0cb12702f6d474fad7170e352a978c4ed4321b243156201a0eaba457387c60849fc5b58ec989ae3ed2ee18113afc6eb21759f7346920ce94ad64bd0e6f71d3f2f1ed5aa83fe2f4dee86fc27fed0591a93f6ca39c79615ea17f12faf4e2b1ace79357252ad51d61e5063919046608ef2a4e39cca87c2696c1a7c9cfc8e8bab11e1e851eeb4e6391fd90a989ae337eb767e01bb1773009bcc8de08b263af6c13a04aa1b3d39eec1d59bd1597e88366fc0e394fbe71e5f9ff27b9cfee46d096c13c331b0f384a39e3382b5513d18373a39bbdc0d26889f98d4985ce4a2ec69f3f4e22abff73248653ffff12bcc52872e1b44175340559cdbc32432c64947eea3e997b2af82504ff5a90d1ebffb4646b9968808946991e9a654b3c6058b9c1b3ba2f81f593156ca1fe53d45bc2662177d8575b14863af08341eeee4fc6540475a06f7074869b91ab2432ae4f27462648aabcdef8756c86271881184cc3c501bbc3af5d0ece2a59036b63164d1dd82628687616f660695a1945b7b58d44e5919307b1efadf3bdad6cf704aa70b920a81ae904931df92496033f9ce99dcc711737de8fad61df934c1ae4cb9fe5d1d91584be0888f7da425416a509b304b3bba6791ea69adfb88a96362bc6e0f7ec7e4479f6c68d4cc69861a0e67c8d7867fccfae420b3d138a51226cc8d491039de71cc24c3e5b239dea14f802efa85b17e463438495a32e2117f26e8f2e89b616e14ad77c896c045e020e1bdbdcb3356180d5e5275c35eba77c402b2093535627d327407d838285417b6a3f2bc1bbf07a5aae119558da42c257b85daaeeb98bc91b7bd6deea182f088aa8d8e2d0c970c5ef41f454b76d06fb6b40fa22ef992682ed5d8d0997e2793300807a1d7a0ebba5565587ac073ccb8429f2095818a5cd9f7fe200451f0be6e25ddd7c00a468677f29927c0cdaf1eec539068ae2280bab1cba77a9e01dfb50fd58f5aabc64dd99d9b38ac16b5160ad21b05fb6fcab42cc0819c495a46de0678735b02df8d28fafbfd438f697154cac3814fbf29d762617279b7b87162226ef8aba5ade35a7dd44674d532f6397e00ff63cd73251c0043f449a4b6051bde5619f0710f29548fd77fce6780c14afa57b3da83cf1530631c707e4f37881e41d07533075cd74a5619d84ee72678ea02e82f86502be3e2bd478b6a2cc8fc5d6ce0f481b24758fed1b1d1f4805ba705a1510540d890268b3bcc8242a5ada5dd540b4a01906a5455f4ff1e044a117bc8a8d768e9fa27ecdf2d6d122c7ce2ede081cc30675ad33f746686c21a4f4826fb6939181740801afaff48fada6723c38ebd3665a4b611e0cfa75cf701d753b583e2cca7a575b610ed3b2fb7200dcf2388248c0167cc9a56db13986b19aaccb46941bd32435a1a831a24349d068ee21fa2b32", 0x1000}, {&(0x7f0000001200)="183b8f8614f2883fd25917c4840583d7d53fa9d48cae1d7cd21137eb8eba514b537c3b05c4b7fbea146a06ec9c9deb363e3cb97540eaf541606ed2a2fc6b149f48226ee17e99c3d6933583bff8a758769d3ea206a9ff85a0b0bfa5eac3cc6c0d5e05ade686ec5c19e651256904ef273b89b4a318a431ff691f8244dc5e7313632865de1ce91e48f90f813792c0e830e044263998b577c407841e9b3f10cef1f9decd4088e2502bd0d86387b94bdf1abfd25722b0d232879d7ad36d88e59b1b294cead2781fba7eef9bc6f4a6f1ced1", 0xcf}], 0x6, 0x0, 0x0, 0x44104}, 0xab06cd7f044df198) [ 2403.832190] loop4: unable to read partition table [ 2403.847367] loop4: partition table beyond EOD, truncated [ 2403.857559] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xde10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r2, 0x0, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x420000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r3, r4}) r5 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getcwd(&(0x7f0000000300)=""/241, 0xf1) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r3, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) fcntl$setflags(r3, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000140)={0x9, {{0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x800}}}, 0x88) socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2403.969570] Dev loop4: unable to read RDB block 1 [ 2403.981482] loop4: unable to read partition table [ 2404.005103] validate_nla: 11 callbacks suppressed [ 2404.005112] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000002c0), &(0x7f0000000300)=0x8) unlink(&(0x7f00000001c0)='./file0\x00') r6 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x84) write$P9_RWALK(r6, &(0x7f0000000280)={0x3d, 0x6f, 0x2, {0x4, [{0x80, 0x0, 0x8}, {0x0, 0x2, 0x8}, {0x2, 0x4, 0x3}, {0x20, 0x0, 0x4}]}}, 0x3d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2404.012150] loop4: partition table beyond EOD, truncated [ 2404.056800] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700060000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xdf10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2404.237401] Dev loop4: unable to read RDB block 1 [ 2404.252006] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2404.265313] loop4: unable to read partition table 07:57:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x408d00) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x5d3e5811db5ab3de) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000080)={0x1, 0x81}, 0x2) r5 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000240)="e0219ba4b1b3103501f977884d08caaa034518fbfdee00066ffd89d1614e920efbf1b3ff401b38289a69000e26adb471507fdfcbdd9ddbe2f8ce42c1b4bff08912f2deda41599ac04bbb2c814f5dbd255b56aab9e07b3b489b5d470f3d06ac0e5b007b0b23fbd838e0e9aa4bfd650e7becd62b9afdb381887fb0222ec493353dee281f6cd7c997b139106c2d3faea6c2177be5f49e22ccd10c04fb5cd52379bba0a64fe6dfd85fe5e0291a5a0ed664ee3492471c43f966b877e508bf487d177d0ce8b1dcb3a44d911b2f78c0bc90565e1162e26ab96707f6289db7da0114775ad346a2b8ea01a174e78506d586e79378df0f9c60dd1f50", 0xf7, 0x0, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r9, 0xc0845658, &(0x7f0000000340)={0x0, @bt={0x8, 0x9, 0x1, 0x1, 0x40, 0x7fffffff, 0x1ff, 0x8, 0x9, 0x37b, 0x80000000, 0x7, 0x6, 0x5, 0x8, 0xa}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_INFO(r12, 0x0, 0x481, &(0x7f0000000400), &(0x7f0000000440)=0xc) r13 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r13) accept4$packet(r5, &(0x7f0000000040), 0x0, 0x0) [ 2404.299786] loop4: partition table beyond EOD, truncated [ 2404.325221] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCAX25ADDFWD(r4, 0x89ea, &(0x7f0000000000)={@bcast, @default}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r5, 0x4) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f0000000180)={0x3, 0x6, 0x5, 0x7}) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2404.366957] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x25}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x11) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x10000, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x203, r0) r6 = socket$nl_route(0x10, 0x3, 0x0) pwrite64(r6, &(0x7f0000000240)="5c3e811eed7634321e7aff47935d259d17f818c46035bcb679ac9fcb7412539dfb741a1d86517a9c1c2527a762a6dc7f8c25643d8f34c68d6540cada2001b62191ef364d205809d590c75e95af446bb013f9e9af68004e7e22f49b82be87ef5351f46e19d0aa236576e6ae26e54d51d2cf1b9ed932d0558947ed5d4f0e48f6221fcaeadba02e675d0e550f34f9dda31e3c60a76ceb29c691ff93880d7d48295d4b4195d6a9a17d0704abf59acabc2fa21333c2c56cc17bef1c0630ace0f8215e6a57219b4ac0aa64192b07", 0xcb, 0x0) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r7 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) r10 = fanotify_init(0x9c, 0x101000) fcntl$dupfd(r9, 0x406, r10) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f00000003c0)={0x9, 0x0, 0x1c000}, 0x4) write$cgroup_subtree(r5, &(0x7f0000000400)=ANY=[@ANYBLOB="2b637075de00161c1362933bf582d396cfc1a9dbc0203b0fd77ca1184542f9c4398fdbb48014268d6b6550e96b05713569faa059b2a967fae58cf96fb83cd6f29911eb966f19075773f1a05fa264b6107d174637809cb4506fc0a93241d7529ba65f5ec3cf2c0723d8f75fb6acf3f15a344b"], 0xfffffd88) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe010010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2404.416114] Dev loop4: unable to read RDB block 1 [ 2404.421037] loop4: unable to read partition table [ 2404.434126] loop4: partition table beyond EOD, truncated [ 2404.448048] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:42 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700070000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xb2, 0x240) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2404.542864] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x402) accept4$packet(r5, &(0x7f0000000040), 0x0, 0x80000) 07:57:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2404.706947] Dev loop4: unable to read RDB block 1 [ 2404.706977] loop4: unable to read partition table [ 2404.744873] loop4: partition table beyond EOD, truncated 07:57:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffffffffffe1a, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r6, 0xc0845658, &(0x7f0000000180)={0x0, @bt={0x6, 0x2, 0x0, 0x1, 0xfffffffffffffffc, 0x2, 0x101, 0x5, 0x8001, 0xfffff52c, 0x40, 0x8, 0x5274, 0x6, 0x2, 0x10}}) r7 = fcntl$dupfd(r2, 0x0, r3) r8 = creat(&(0x7f0000000000)='./file0\x00', 0x101) ioctl$sock_SIOCADDDLCI(r8, 0x8980, &(0x7f0000000080)={'syzkaller1\x00', 0x60}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe110010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2404.754807] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, 0xfffffffffffffffe, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB=' \x00\x00\x00\x00'], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r2 = socket$bt_rfcomm(0x1f, 0x0, 0x3) vmsplice(r2, &(0x7f0000000200)=[{&(0x7f0000000080)="8f6a43580a308903342ac801426af4e8503d01a759127da821d35b9b06cf826bd6e76fc739d2ea5280c1e36b1fcd028632ed07b2d2c2d84bb4b6426353c3b32111b01e", 0x43}, {&(0x7f0000000100)="6fd7c53e4b0a77c11464a9959084cc470fb07a7ed53ff04a2c0743143036189186cae4c05d721cd7099615672c1269e68e25d9bc592baf8053403d5533ea1ddc1cf309225f91fd7abf519178fb75ca9a7369375788262eb4cec87a5023266aff6e9ddcf22c76cbc770f8df7a48653150f24fe9b5e96441284b0064227fb9dd986b74ce7371e4cd9c6e988a153a0bb9908b14913e5d5637d34830033f715649b358d88fbb274397150854ef66fe1b1975122f47f079716e019a9342711ac90be52cc1dcb2b6d5c7059ef6b888451927bb2442b7d86b42820e8a1a", 0xda}, {&(0x7f0000000000)="288bd18017f82c", 0x7}], 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) [ 2404.869551] Dev loop4: unable to read RDB block 1 [ 2404.876196] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2404.884985] loop4: unable to read partition table [ 2404.910079] loop4: partition table beyond EOD, truncated [ 2404.918307] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:42 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700090000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f0000000180)=""/33) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r1, 0x0, r5) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400000, 0x0) write$UHID_DESTROY(r7, &(0x7f00000001c0), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$alg(r6, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0xfe62) r8 = accept4(r0, 0x0, 0x0, 0x80800) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40000, 0x0) sendmsg$TIPC_NL_MON_GET(r9, &(0x7f0000000100)={0x0, 0xffffff37, &(0x7f0000000080)={0x0, 0x334}}, 0x400c814) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000140)={'hsr0\x00'}) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) accept4$packet(r8, &(0x7f0000000040), 0x0, 0x0) 07:57:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2405.048284] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xf38) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280)={0x7, 0x7b, 0x2}, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') r7 = getpgid(0xffffffffffffffff) ptrace(0x8, r7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="2b706520001d00000000000000"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r6, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16, @ANYRESDEC, @ANYPTR]], 0x3}}, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r7, 0x0, r8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r9, 0x0, r10) r11 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r11, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$packet(0x11, 0x2, 0x300) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYRESDEC=r10, @ANYRES32, @ANYPTR64=&(0x7f0000001900)=ANY=[@ANYRES64=r5, @ANYRESDEC=r5, @ANYBLOB="e7d4f05f6f7ee8c73757da8920b807604b841ba44e67781dfe500c46c1b48603f8ca893f5b4d38a3025c3b04937cd970d76fd91349d93db1e385d831b87f3100000000148448734e5473dad4314cb802c2ee58775347d78379ca2900914fab3d0ee719e3b54f4cbc1852efe4b442c53f9891bdfde330353d0ba44073138f8c19244caa02049d30be298bd15448e2bd035404a3cbae8b6e10c3510ac3e08082f39b1cb7b7d098e3cd0ad207000000a46d22f1", @ANYBLOB="ed7bedb64f4dd151ac5d3507c81eb51cf52d407ae62f9a1ae579b3baaab2e45b22674a3019f884fee23257cca3884c350cb550c749c37087d052c390e292bc3f23c25b42d77f691717fc69bcf77af769be4c3a545c37d1a0338f2397ba5bb44f177322", @ANYRESOCT, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES64=r14]]], 0x3}}, 0x20000020) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x1e}, 0x2b, r6}) [ 2405.135588] Dev loop4: unable to read RDB block 1 [ 2405.141149] loop4: unable to read partition table [ 2405.148904] loop4: partition table beyond EOD, truncated [ 2405.157738] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe210010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r5, 0x0, r6) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) [ 2405.278457] Dev loop4: unable to read RDB block 1 [ 2405.288470] loop4: unable to read partition table [ 2405.304918] loop4: partition table beyond EOD, truncated [ 2405.324279] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) setsockopt$inet_tcp_int(r2, 0x6, 0xc, &(0x7f0000000000)=0x10001, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) getsockopt$inet_int(r1, 0x0, 0x18, &(0x7f00006ed000), &(0x7f0000000080)=0x124) r6 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) 07:57:43 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0726110000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2405.370030] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe310010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:43 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x280, 0x0) write$P9_RSTAT(r0, &(0x7f0000000080)={0x88, 0x7d, 0x2, {0x0, 0x81, 0x7, 0x7, {0x6c, 0x4, 0x1}, 0x10000, 0x5, 0x57, 0x7, 0x27, ')#)(,:securityloem1security*trusteduser', 0x2, ':@', 0x0, '', 0x25, 'ppp1bdevvmnet0cgroupGPLeth0[.GPL$#em0'}}, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) write$P9_RMKDIR(r1, &(0x7f0000000180)={0x14, 0x49, 0x2, {0x2}}, 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:43 executing program 2: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_IO(r3, 0x2285, &(0x7f00000002c0)={0x0, 0xfffffffffffffffd, 0xd5, 0x4, @buffer={0x0, 0x2e, &(0x7f0000000240)=""/46}, &(0x7f0000000380)="90a38f0d2b56ebcf70409edec224be476c32fa34b94e870ca0c09ff8184acefeec17634c70f49267520700a00b06a6923a2dd8593f38c99579f2cec14cc021aba1805ccf00c4dbe29827bff7579004409623b291748173a1d774c4529f082b0eaf3384b3089229f6bdd5a92878d268fd7833f94b0425f9f6fbb786b6fd27c0d6428173fff36b14fe637cf34b6da4233f8c79c6a7a67bba920b71d07ff801129be53a0128dc61409f4e184b14e06ebd7f5aa4ad7e93ccb371d319bcf762b8e06c5e17059d317976144254847cff0fe1e38ce3e72e57", &(0x7f0000000480)=""/195, 0x100, 0x10000, 0xffffffffffffffff, &(0x7f0000000280)}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, r0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000180)) r9 = openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r7, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r9, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x10000) [ 2405.604041] Dev loop4: unable to read RDB block 1 [ 2405.618513] loop4: unable to read partition table [ 2405.627956] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2405.652927] loop4: partition table beyond EOD, truncated [ 2405.670944] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:43 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x2000) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000080)=0x9, 0x4) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x11c00, 0x0) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x100000000, 0x2000) tee(0xffffffffffffffff, r1, 0x1, 0x7) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setns(r0, 0x22000000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe410010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2405.830548] Dev loop4: unable to read RDB block 1 [ 2405.848662] loop4: unable to read partition table [ 2405.861829] loop4: partition table beyond EOD, truncated [ 2405.867895] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:43 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700140000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:43 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffffffe, 0x2000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x88000, 0x2) ioctl$SG_SET_FORCE_PACK_ID(r6, 0x227b, &(0x7f0000000100)=0x1) fcntl$dupfd(r4, 0x0, r5) r7 = dup2(r5, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) getpeername(r4, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000001c0)=0x80) sendto$packet(r9, &(0x7f0000000140)="f1f28aee8c6886c8de4da36a1736f5718ab7a0e91df8fee8a3609c8311306f363acc368063cfa244e5a9ae3dec9571eb72dfb89607632e07612522af6a8eabf24e9c8c670bb52ce47c40fb0a66fadc15cbf324034672d32c3df6dfe9796292190caef8da65cf2d", 0x67, 0x4000000, &(0x7f00000002c0)={0x11, 0x18, r10, 0x1, 0x3f, 0x6, @local}, 0x14) [ 2406.011217] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="28000000fe92cfdf30e4283f3ad19c45fdf6e68ac6a3cda090df330d377fdf7e7e7a0e53919125aa35eea4cfb04e581ad632184ede6426900f2e75eb0b9ca3062581e0e6fbfe4f54923181b31c654afa695187b29173451fa2f9f27e5768e6d9c66297371bc911a8ae21653a83dd222accd240888ac9744c62e4a5e6806bcff62951007b334454fbc8ccf6967bc208e4a67bdd25a13700000000000000", @ANYRES16=r9, @ANYBLOB="030b00000000000000001600000014000100"], 0x340}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r7, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40080000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)={0xd4, r9, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xffffffffffffffc0, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf0000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff6f}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4008884}, 0x801) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$cgroup_subtree(r12, &(0x7f0000000300)=ANY=[@ANYBLOB='\"\x00\x00\x00\x00\x00'], 0x6) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz1\x00', @null, 0x8, 0x6, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2406.129850] Dev loop4: unable to read RDB block 1 [ 2406.138362] loop4: unable to read partition table [ 2406.144180] loop4: partition table beyond EOD, truncated 07:57:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe4ffffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2406.177534] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2406.260364] Dev loop4: unable to read RDB block 1 [ 2406.267049] loop4: unable to read partition table [ 2406.286352] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2406.287603] loop4: partition table beyond EOD, truncated 07:57:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r5, 0x0, r6) accept4$packet(r6, &(0x7f0000000500), 0x0, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$packet(0x11, 0x2, 0x300) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$FUSE_INIT(r11, &(0x7f0000000480)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x7, 0x0, 0x8d81, 0x5, 0x400, 0x8}}, 0x50) r12 = fcntl$dupfd(r7, 0x0, r8) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendto$rxrpc(r13, &(0x7f0000000400)="ff0a05470ca4be3a46cc32e2e1c942b3f6711b571970b12fbb1db8efb8850848bc0e199be8a0420ce78a4b12f5b96183c6beedd3d597c8e01848712733d2513d06523abf135ee36012ddaa1d7c1b70c0a5f02ad47795bcce104be98e7727aefecd24478621", 0x65, 0x4, &(0x7f0000000080)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x24) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e23, 0x5, @local, 0x4}}, 0x0, 0x56a4, 0x0, "94df689dbf1290423ddfae9e03f9ee30d5e4058d55f6f30d4ad6189ead602a799dd57b03bc8dac48831abfcb4da860b4a1ca3951b2e80c84f40c54e4362aee53b953b18968669c650beb6b36cb4ac2e5"}, 0xd8) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) recvfrom$netrom(r12, &(0x7f0000000140)=""/183, 0xb7, 0x40008000, 0x0, 0x0) 07:57:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0xffffffff, 0x321782) ioctl$TIOCLINUX3(r4, 0x541c, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) r6 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = socket(0x40000000015, 0x80005, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000380)={r9, @in6={{0xa, 0x4e21, 0xa, @dev={0xfe, 0x80, [], 0x1d}, 0x8}}}, 0x84) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="2bfbed627168a7538ce3d05f278f9e98637075201709f8b37f12f5a96e4bd3eb13499909fbe3a4ebe56d7d92fcfa81f2eec2f1434256a5e37b260d0c380d63fb2ca16a4a809827f763ff978e42014362abc21e3938d4f74af78e3aeb40aa1d54e5b2ce22e84820b1ab34cd72"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2406.323341] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:44 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0703190000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x3, &(0x7f0000ffd000/0x2000)=nil, 0xe4c4a328644b2a70) 07:57:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe510010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2406.576031] Dev loop4: unable to read RDB block 1 [ 2406.586943] loop4: unable to read partition table 07:57:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2406.631274] loop4: partition table beyond EOD, truncated 07:57:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x8, 0x0) ioctl$RTC_PIE_ON(r6, 0x7005) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r17, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r18, 0x0) r19 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) r20 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r20, 0x0) write$P9_RWALK(r20, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r21 = dup2(r20, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r24) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r28, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r29, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r32 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r32, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r33, 0x0) r34 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r21, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r22}, {0x2, 0x7, r24}, {0x2, 0x6, r26}, {0x2, 0x6, r27}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r29}, {0x8, 0x1, r30}, {0x8, 0x0, r31}, {0x8, 0x2, r33}, {0x8, 0x2, r34}, {0x8, 0x4, r35}], {}, {0x20, 0x4}}, 0x84, 0x2) fstat(r2, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x6, r7}, {0x2, 0x7, r24}, {0x2, 0x6, r11}, {0x2, 0x5, r12}, {0x2, 0x2, 0xee00}, {0x2, 0x0, 0xee01}], {}, [{0x8, 0x7, r14}, {0x8, 0x1, r15}, {0x8, 0x0, r16}, {0x8, 0x1, r18}, {0x8, 0x2, r19}, {0x8, 0x4, r36}], {}, {0x20, 0x4}}, 0x44b, 0x2) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0xfffffffd, 0x1}, {0x907, 0x80}], r7}, 0x18, 0x2) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2406.672937] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2406.798790] Dev loop4: unable to read RDB block 1 07:57:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2406.818965] loop4: unable to read partition table 07:57:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe610010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2406.840120] loop4: partition table beyond EOD, truncated [ 2406.861804] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:44 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700200000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2407.018613] Dev loop4: unable to read RDB block 1 [ 2407.041879] loop4: unable to read partition table [ 2407.048787] loop4: partition table beyond EOD, truncated [ 2407.058082] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2407.136546] Dev loop4: unable to read RDB block 1 [ 2407.141768] loop4: unable to read partition table [ 2407.148006] loop4: partition table beyond EOD, truncated [ 2407.154079] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000280)=0x4) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000180)) r8 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffff564, 0x800000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000080)={0x5, 0x6, 0x1, 0x1, 0x2}) 07:57:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe710010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:45 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700230000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2407.428598] Dev loop4: unable to read RDB block 1 [ 2407.443231] loop4: unable to read partition table [ 2407.453795] loop4: partition table beyond EOD, truncated 07:57:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2407.476298] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r6 = dup2(r5, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r17 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r7}, {0x2, 0x7, r9}, {0x2, 0x6, r11}, {0x2, 0x6, r12}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r14}, {0x8, 0x1, r15}, {0x8, 0x0, r16}, {0x8, 0x2}, {0x8, 0x2, r17}, {0x8, 0x4, r18}], {}, {0x20, 0x4}}, 0x84, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8) r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r21) r22 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r23) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r25, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r26, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r29 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r29, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r30, 0x0) r31 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r19}, {0x2, 0x7, r21}, {0x2, 0x6, r23}, {0x2, 0x6, r24}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r26}, {0x8, 0x1, r27}, {0x8, 0x0, r28}, {0x8, 0x2, r30}, {0x8, 0x2, r31}, {0x8, 0x4, r32}], {}, {0x20, 0x4}}, 0x84, 0x2) r33 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r33, 0x0) write$P9_RWALK(r33, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r34 = dup2(r33, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r34, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r36 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r37) r38 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r39) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r41 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r41, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r42, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r45 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r45, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000900)='./bus\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r47, 0xee01, 0x0) r48 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r34, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r35}, {0x2, 0x7, r37}, {0x2, 0x6, r39}, {0x2, 0x6, r40}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r42}, {0x8, 0x1, r43}, {0x8, 0x0, r44}, {0x8, 0x2, r46}, {0x8, 0x2, r48}, {0x8, 0x4, r49}], {}, {0x20, 0x4}}, 0x84, 0x2) r50 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r50, 0x0) write$P9_RWALK(r50, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r51 = dup2(r50, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r53 = socket$packet(0x11, 0x2, 0x300) r54 = fcntl$dupfd(r52, 0x0, r53) ioctl$PERF_EVENT_IOC_ENABLE(r54, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r56 = socket$packet(0x11, 0x2, 0x300) r57 = fcntl$dupfd(r55, 0x0, r56) ioctl$PERF_EVENT_IOC_ENABLE(r57, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r25, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xfffffffffffffd08) r59 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r59, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r60) r61 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r61, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r62) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r64 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r64, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r65, 0x0) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r67 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r51, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r58}, {0x2, 0x7, r60}, {0x2, 0x6, r62}, {0x2, 0x6, r63}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r65}, {}, {0x8, 0x0, r66}, {0x8, 0x2}, {0x8, 0x2, r67}, {0x8, 0x4, r68}], {}, {0x20, 0x4}}, 0x84, 0x2) r69 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r69, 0x0) write$P9_RWALK(r69, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r70 = dup2(r69, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r70, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) r72 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r72, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r74 = socket$packet(0x11, 0x2, 0x300) r75 = fcntl$dupfd(r73, 0x0, r74) ioctl$PERF_EVENT_IOC_ENABLE(r75, 0x8912, 0x400200) r76 = accept4$rose(r75, &(0x7f0000000800)=@full={0xb, @remote, @netrom, 0x0, [@null, @default, @netrom, @rose, @null, @bcast]}, &(0x7f0000000840)=0x40, 0x80000) getsockopt$sock_cred(r76, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000280)=0xfffffc36) setreuid(0x0, r77) r78 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r78, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r79) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r81 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r81, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r82, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r85 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r70, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r71}, {0x2, 0x7, r77}, {0x2, 0x6, r79}, {0x2, 0x6, r80}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r82}, {0x8, 0x1, r83}, {0x8, 0x0, r84}, {0x8, 0x2}, {0x8, 0x2, r85}, {0x8, 0x4, r86}], {}, {0x20, 0x4}}, 0x84, 0x2) getgroups(0x5, &(0x7f0000000080)=[0xee01, r26, r43, r67, r83]) getgroups(0x2, &(0x7f0000000140)=[r15, r87]) r88 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r88, 0x8912, 0x400200) r89 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r89, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) r90 = fcntl$dupfd(r89, 0x203, r2) ioctl$PERF_EVENT_IOC_ENABLE(r90, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 07:57:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe810010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x9, 0x4) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x8) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000000)) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2407.648759] Dev loop4: unable to read RDB block 1 [ 2407.665072] loop4: unable to read partition table [ 2407.691909] loop4: partition table beyond EOD, truncated [ 2407.731726] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:45 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0711260000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) sendmmsg$sock(r0, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="b2d9abb59c4901f48b3393d34ce5d352874166378dfe81a38463ba0535b1eb8c54ca6444fdaa338925e1f71f929242da6b159adc44f2d1eee1f98a6b1a4a3e741827176e0c052a2f9d7da5c11a3aa5edacee7d90d108e8ef4ab9b5dda261d869b4e5a87aaae5ea49935460a10abcfe587922ba4cca9ce8f2a59ffecb6d926d0a7032e332c489828b5b2066ac954793e31836afee870c76d49547696c7c3350e0f518f7177d440b29654f4b5026dc5897f0185e1a803bce91813056f5dbb2447a20534db3871bee097d7406336ccb46ac3f72df1228e5c29d67a231f287e1c9f81414cb9eaf0272db428f3c0410487c183e96", 0xf2}], 0x1, &(0x7f0000000300)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff7}}, @txtime={{0x18, 0x1, 0x3d, 0x7fffffff}}, @timestamping={{0x14, 0x1, 0x25, 0x10001}}], 0x60}}, {{&(0x7f0000000380)=@hci={0x1f, r2, 0x3}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000400)="92c3aa47d33dfc537203fbc01affe2273c12055d08f18bacfe4daeafc87cbeb13c85de9d6452018b26d8f9cc0aab8a6047010a2086cac74ab7af501c564194edaa30fca8e604d9e15779cc9307f4276c4a0aa7c79b859f85d1632e25", 0x5c}, {&(0x7f0000000480)="97b2e362094bcc82138454ba76323956ebe2398d449637ca61d0bd6e975a7329ad130c4d565fd7f35d794807fc8ae1617bca2a74415f8f226304a10f29cb597b2442bda86f4a15", 0x47}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="b39703a8b88a329e", 0x8}, {&(0x7f0000001540)="d8247ef7768301cb300fb0977720fc6bb77c9dc2d766d40677b4ff86c5e57b7a6f0bb487f9af58db0701eb13c98449605a9783fbe9d7111e375c1f16f2f35d8f7f1af5b6eccba662a09b7b78fe024935d0b6d69ca98dec20112e29db6ac753931c3cd3", 0x63}, {&(0x7f00000015c0)="9b1a2524c6300c2f8d802c54fdb4481d2f6ca3b71e0fc512793d170e759016197607e783d3027a01d9c56b46dd6f24fe82d0cb261a88f214e7a0751e01db0dac1fcda56de6d702c29581a54a593bd1e81d86781d0c634bf01f1b77a08d9f3240288e51db158c45d369916125d96fce3a36d6e2294f5425196e4e61855538d561f886ddf29706a7365fee422bbb7afbba50a5", 0x92}], 0x6, &(0x7f0000001700)}}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001740)="ffed1316284d89bc55e82e9ee1328fc9af2f41b41e83ba1183848e6812f7c46e9195618a216ca5f779988ae4933687b83c3610f8ae8b27c3944c9142fe1acda733f70c1ff1b9abc270826454ff114d638ab608b0752d5ec592ac07feac561ac0b5d302e9907526b5e92f7a827a939f5c0724c5c2004ddf6cddedc5050bd6d3d51ee2b8abfda74e0b9ecd0122052a8569fca9ff50e4e7a501340e7ecdea357c40eceeda68c5466a1d2d8a2b3026c0a78f9159b4323159", 0xb6}, {&(0x7f0000001800)="de38ce60fc8e4d770ddee93b9d4af675509e4b76b755230091f2c62d7f14f9c63fc03f3e604e483cda6b37d7fc73eaecf7984d8ecfc88cc03f0e41dfac9b35d730c43cb490f931f80469028de232ad3ef660408c14558f091fbcf669076489f854811fd760ba9f29323ef12818e9580be8a92cbc1a7b8233dd5193b7b0eac4d6957f2ece1b2cbb8ed9533a6de4fd186afbdcaab6f129266ded00bfb7f562644da32006d262e971e2812d8bb1415e6d76292327fb170d975e77ab69be96eddbb46ff460fef503aa108f1d751bdc55", 0xce}, {&(0x7f0000001900)="b74a4e6c316a5919cc90bc1cdeaa2ab4c0f47f94aa9f5eb295caf64688407dac0d81172006321788976854e558984608f4f384badce462d72847cd4b7e0ee8feea675be028e24a2b56fb19a84101148416b1c5b4ce639990a70c3c346797ccc8bac11904cb9426acff6ab9a8c79a0474eaac352e44e78d9b4cba61ac51081cae3286d13535448b33d6521f145a50baa1415060a88bf61ca851fd1ef7583f9f849a558869c1e07999007927fefa12a7600dc29a0a7c01d86cb3b28b3e8edd5cdd3cb68ebd5d587709d40e8b13447525cba701ce19a728148003280d41b1b84d7b420139622b99a024364b0e6b52e1f205", 0xf0}, {&(0x7f0000001a00)="bf859f2cc002ccd5638d66733e54879786ae40e02087cc00429fea2de932b6", 0x1f}, {&(0x7f0000001a40)="64626539bd4a67de4f2d8f08bf05ccf8345567", 0x13}, {&(0x7f0000001a80)="550c1aec84abb9d831e1bb06197127de7b9a42c8c18a6f862316e408289a2994acb85cfcad04f53d2fb646c402d653a367b3dfcf15a61bdb4b1ecb0d98e18cf3e2369ba64b96a5f79544b7820114c4b123c6f42430a5116cdcbed64042cd7d144ace1fe7547d92835f82ad51691d11f0690acfa058edb808b5cb8c870f6e7e7c32f11f7f60c3d9b5d6b2febae4d0d7759be9e7093fad9b9163963c40e6ad925f2773660d2019f04787ef565de10b62f0bdc0826b860c331624a8b047d1766d3071cbaa0dce9a1962f30254cbdf155e63f8c35ec99b314f509b42b97d7d53ba7dc02864fcf36d23a3c3413d19345bf4b0fe5b0ae50993e9a7", 0xf8}, {&(0x7f0000001b80)="516225f1b2adcb2bf24d96db21ee3ddbb583f2144b56c3834310aca6d1e6c83f32b18230bdcb564fb2bc2288648ace2773259db505ea8d104cb3f852616f9a10609193926f8111de938f0925b085ea7d7da262d7d37c22b348b3cdaec5fdc85c40196969aa0abc0cfc19242acb48c021ad68899ac99259b61ed1bbd873ab42cd", 0x80}, {&(0x7f0000001c00)="36ba316a1f54b609b36cd619641c2f1babb3e4c9bee73921dcdd816bd8abba4e8a803c35ee5cf3ece2cad64a24d78da10f3eb0308f1540a6ea267dcb7a8a33332b764b0d7a24add66cdba11ac55999ce946488b06a2ea723238324d37bedcb593d5d5e0a6b", 0x65}, {&(0x7f0000001c80)="cc59cc9c1a253030dff80b9d844138a9fce0011bb946ed43e607f47380d58c0b62024fb65701558a3232646518a7354fcf3d4c88deffebce01809e37b588d646cc655785f4ff357d58934b32ca8d0644b90e12caaf48fbf19ef7a5d4bafa", 0x5e}, {&(0x7f0000001d00)="6e75d3fc75994fddfa4dd03f6d9c4e0ff2a9b940e4e0ad5a2de0960f38f36ca6dfa6b8ce75b24148e5454c84ce8788aa4ee22dc84948921e4782ee556422c7f90829f206d0aefb089e6d103935fad2e5fe8ba126fdfebc0f8ee9806f", 0x5c}], 0xa, &(0x7f0000001e40)=[@timestamping={{0x14, 0x1, 0x25, 0x30c0291d}}, @mark={{0x14, 0x1, 0x24, 0x800}}], 0x30}}, {{&(0x7f0000001e80)=@l2={0x1f, 0x9, {0xff, 0x2, 0x86, 0x80, 0x1}, 0x401, 0x5}, 0x80, &(0x7f0000003040)=[{&(0x7f0000001f00)="bea3cfd8464614ab6c71f02ff009dd01d3c38f076b71aba45b29f184d057789a524f34a4c877df06e1bf2187abfffe2877c2bba3fd0e72e7424fb1c33fa153be154a32f944fd0051ba259767a810027252effa18bcb02fbefb2ae87c504fe3", 0x5f}, {&(0x7f0000001f80)="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", 0x1000}, {&(0x7f0000002f80)="be93f9987f49905a6c5856b9133de7c71e9028c42c343fb5051735abec0a09670b8e3b34d58b26209c2fead5fb9d356e5231115a4b28b24d72e8570cfac27ee1a66325d3ee083bc742641c9145f6253372e52e6f1b1fa27054a60dae9271dc688432181ba001358518659c8cc356e413701b43628922d09df51ddbb21eccdb1d9c60e7d9ba4442ba6b8ac9ed725902a2f4eeef781fc4abca99336328f035087a5c4a31cdaacb7065bbdce203f0b8ed4f677f1d19", 0xb4}], 0x3, &(0x7f0000003080)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x18}}, {{&(0x7f00000030c0)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000003240)=[{&(0x7f0000003140)="b630fa6ccb8d1101722167d32dc27a97216f2d9294272bd2f2e7fa18d40592d95fe3630f121b927cfd833336c9a1b8c757d571099bfe91006eb7e77a33c56249db5d", 0x42}, {&(0x7f00000031c0)="446ba9cd8061c2d320c12293076c58ea1bfb9b497885620fce52f1937aea61552e498f1f69b2de445ef09c4a849f39e02a0dea15b2791aa5eafa93c714415b4247", 0x41}], 0x2}}, {{&(0x7f0000003280)=@nl=@unspec, 0x80, &(0x7f0000003500)=[{&(0x7f0000003300)="48cafab6273690616ce84b066ec2ffd46f20d7d1fe6b9952758abfa7acb1ceb0d23c748234de0fe0e998d4d19944adf02d782c7988dcf8a1c62ffd3830682ed800699d8e6447d22c6bff40b9edbdf3e761b01f1e1849da726b5bb2fa0d1519348b4349ee5cfce957710d741a616a65699936f4c4361fb8aace89eb7e67d72b308d87a85f2fe1a6c4780a81d5df7fdc417d4816583d538c5f5e7f6fbc992a319767a9cc3df6ec821833b846e8", 0xac}, {&(0x7f00000033c0)="4bfe0f7ee498d593ed572682c62b3916e42a19bb24fc1da68a027158f2aea71a12dee6507eedc923dacaf6d7d6d0701612fe86f3d92e04429157ac38", 0x3c}, {&(0x7f0000003400)="ecefa2f8d1f9f2fd7136c731c95c08f49fb827c0acc0a4d3a24dd8c6428da010ca923c708f27ea67ec9678a194371078290a62aa54ac5c258c35825f60ba44e21f21e2e496bfaae62c82c940a5ce9417255353524b1b81c4a33b05e2", 0x5c}, {&(0x7f0000003480)="559ca1be2fd8b9ad07b726d379aed22ac926771979cbbf1f4dcff3d808e77651f1298a50cfa5d3112d99df754dbf", 0x2e}, {&(0x7f00000034c0)="8701ca8010af0879d9243598765ed8697a1f1e7d00c823dbab3ff8dc32710be8fa398baf16c024aeb9483c40825f74867a981784c33db3fb6275ec04", 0x3c}], 0x5, &(0x7f0000003580)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xffff}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x59}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x78}}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000003600)="810b79e4a6199b16c1c40eacdb624a75f5629605f5c0813f158ae30151d32344c513026cf784fde0eeafabfc226a3e7a1545f7ee050f7d6fcd398815", 0x3c}, {&(0x7f0000003640)="5d9aa8c87942e602350ffe04a3056269bd854d0caadaa6b4ab9f343da519357f6aa5821e77eab7d14134425b4ab98eabed6894", 0x33}, {&(0x7f0000003680)="624413c37f46e945a302e46cb8e500f03e68240f1e7f1d942a9e9598f14bca2bb8a0457e97af94271fa2fbc6c551dab2200e8377491e59d7942cb579f7f9998b011ba05333d1a7c707427a88bc0b650ff607173f38951f2ffecf5ce9aacd2e0aff21", 0x62}, {&(0x7f0000003700)="3b90758ebb05dc617220399c53d483611e671f52281d8d9aecae5e6a3d08238ae3ef1e0a770954bd83b56957d297222d3f2406926abc859764b7383278f9953081a7d70dfab11fc29f8cf278d9b5f85c72f2558d1f225343f89b428b7155077076d736384f6893d169f30cab9a7fe1262c37bcc8741144ea27b64266c0cc2ce6d4d5131c75684479273aaf1d380b58d7e4580106242162777b10755ced9973fe9f633e5846d2ae1555526105af1cda050ce6fa0f363e55fbe0cf67dcd4e1c6a3569095be350140ec9da8efb7ee22a4de52f377474184e05d84fbc0dea3d8c41c18b271fde88008c5127b5d2e3c2082", 0xef}, {&(0x7f0000003800)}, {&(0x7f0000003840)="01aa6176b96cc71ddb90ed0bc0e95576e9d6b46aed7cdaf3f92d8b668c819e180bd58235844dd37bc82143f405a3a754f39d9d49f428388f72a099e8bc59992996865586a7901597ca73559e4a0c01cbf66c9b588865f27bb43a1890f52d51a51235e3ff538755edc6b9fe1160b0d9e4c44acb82aa2d7b250fba8eb7551fb105648d19591b012bc446e926ade260fb04f51dbdcfcdcfdd7c82913b93b0385d916acada7f1cfb315c", 0xa8}, {&(0x7f0000003900)="d9352b254ae93564e47294733ddb481ffbc1ce7dd35c18a5035b61df747d55631bba492e6dd0e61e7423b66912e3dfca475cf3ff7bba4e4c97784e", 0x3b}, {&(0x7f0000003940)="57e2836b29f6b1e607fed56fb39220d81a1f66d1401cea5014b65475dda142009fc9fdbba3fe4814ba8f6166f7d4ec2cfa100aa0eb87ea0eda217e96a61c1f7190dd1f8dac239adfd0275ce7a55b57f3123f9ccb99d05dceea9736d5f543d8e2a57240afc39b13b15392ba959d982cd7030975cd49db5db4a13aca638886171fa476a80684e9568273a80439f0db", 0x8e}], 0x8, &(0x7f0000003a80)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x778}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x90}}, {{&(0x7f0000003b40)=@pppoe={0x18, 0x0, {0x1, @remote, 'ip_vti0\x00'}}, 0x80, &(0x7f0000004c40)=[{&(0x7f0000003bc0)="bd320eb12d6a667195d4e655a9082d2fc34a489e2c2eff26fe05c8444cbef631fa1ee5662d81991006fb5f55a3829ad882bd40b1bb0ed4b78976363ecab3a05a786867bf337587479586afbb653b3b85714d18145e820e4acba12b93d6ba82a52986ee98656a08b67a8c", 0x6a}, {&(0x7f0000003c40)="acb0f7cbd93d9d109a5fc842cbb6b2d051a1a05f20882afb77c96e4d953fc450e3d196d5eda87a3d55231dc548331b0f2af10ec881506594fd12940432645bf61b733d136b9dbd13c94b265dbb74bdc40fca5e22c0c433690b27463d7b8045aa0a0329a49cf42c04a82c510d6ba34ab41bdd09d908cc940fa82aa219a4dd23e28359d66f892d41afa8b85fd70b9f363c117356b43fc12425e60adafa7cfd122a440811bb634444952cbeeec6829aa053bb69de09a80f9269afd92da1231583d3031415e200837380879d9b3bcb41487b5064fbd386b35d6f8bdca49505f9c87a5d64d8b80ad3329ab3928378f2d445f73f7166abbb374d7942f5a3bd087d74b2d17c5122fce3063e69c56a95ef09137f2166f92538aa24bb85bd153255af957d17ad949fdadbd77793f01812b02396a7d44efa8d86d4af7912c4d6afe5204e3a76fb322ab3d2651ce873ef3546330324f3d7163c5b80574d742f42fb49e76ececfb0b5e60dce9f55e8a1ce625ded1122ca98af4d3e7cc553618fd1ad645eb68951e777da36d7b72c467e20e6f187839623331d72823b80d36a3e56f804e2a340b1debd3211f3625eef499261129ba188d24a8cfa12e5b8ec9966aec9f0f4c278b9ed1db8ff1a6ec8e390ee98246caf2050d973ac9d5ba5844e491170fdb2b571c604d8c68a1041dee493dcec6c17acda5dc7210ac7bb009d002427575f477e4e256f35b1f359647c7968f3a8864dc933a902776f08631088d879cc66f444ad951afae8b765ea6632903c468c699479491d7226fd069a0e4dffda859fc16c89d2e25ac048a59b3232875c9078db79f609bd1c25b8194b37d0259eed7cf26239b0d5eba3f079f890f1ac3d720eb1fbb8bf6f6f0fd66f38ca161f56ef63a2213df4f3616d9df5b9b91a767e551ae17f6ee07b5fb0f92a9c6cb43eda82534a4d7d9f096146880f404e491f909c116cc1a7b20b10017df7455d6e8636870ee25746ab8bfcee28ee3eea6019eb741a6c3aa8de56c3c62684942917f386aa9276484f327a2748fcdadf0b4e3dae211d0f34efc6e51db81887af3527e9bf8e59ea7e41f1e26e82844f0b512d5beeebaaf2009b3ab70478ddc185c31455a60917bd0920cc47bfe577f27ce3972673b498a83dc0fefa15cd6f6bc359f10e34d14c85310ed7aef52a30d13835c1e0825278740664c94449057b7ff31475282a1a99f54f2bc7860f3e229c1f8aa1968f34dd8506e25b16ce10db9b9db415aec170c7bd4778d06d040ee9b146b05d063768a08739c91243eeeef472a532cbdf4c2e3a3a30bae4dcad8a63cb8fb854272e0fc8864e727177209da109678ec279618ce6f9da907762c0f60f4c969a45105498e4fcf37910443b492da5b4914bf0eb98d87922c4fac5cd9dfcfd3bc06f96146d9c1af9de7265979acb375ab3758d93a62500b274a1a5a250ca0cea0d25707c21a0f48b07143b6e68956a08f8ea9409b8db9eb4795427d5bc78f7304ea7a4433f2e846d2a70a5bb6c83d3980032e138e3b24b5dae8602d2db587faca13e85eb213e63320c6b9fcf00f2ecd2d535e608dab2c0f2558a387afbf8d5e4708ddd1bd3a0e6be83d5c9fd7e4786aca8621a63f62821339bfc55fe8676c601d04552f54dd95b3791954293021584c094af378cd72a0d100cac6c0336948fa5d7ba2870c409b3303977000166a3af035fddf315aa022bbffe475c1a11179a9a583affeb703de1b29affe77196664716adba9bffb73b063ae76d71b1d93fe75ecf08ca45057a58e7033f5a76c6c79869f0ff4a1867b7e99799e8d4ab20aa0b86a4d30629a512e7a76580b2a61f47106959935bf88a03f73a3792102a9757d3546812d5082425164792cf17edfc410c2148412d4ed6b576d3a0a498edb84662dee73de10255f3e73b2394a4bbeb6307b5d48bfd13440cbda523eed922544ffd3d003124d2b3ccb25b2d0d8eb157bc7e99f8c533e73391a9068bca95af7571c36944cfd6cffb9e66e2319611226df1391ff3de7a2441d30b690f3f8b6dc3d44eb98174328a054b3171d950f5717fb687a31affe54309ba59dff8bf863f2402c33aa4f66d27f230080d1b14166df6acb54faf07fc6fb32e855a820704f65b47adf773b4f104a03e74cf4c2a5b60a64be41a2aaf55f8803faa12ccdfede4d9925751be182d5ae1ed065b091008724d291199481d3492109fed771fc741a9b56cdeabae69e7f4dc86f6714b7cce5a583d0b659f59fd6ee09d48da42589db4eaf97dcd91de569beaf0af5546053c32b8efa1165474d1872855a55cdcc936f485f74d14da45071fb33998c4b95e5d42b7be57f627943adcae51812baf54e24b294fedcd409c097315b7ffd377318601324809c49c2607ba8146fc14693469ec7bed9ddb5d78ca9b63a50517d5ae0f8b5fb0a624ef687d0c3cc53e86fc12caf06a549af830f81bb9e3ef79dcb5c2bd0587aaaf6b9cbe59634f1463a40a71139ce3bcae869402fc4a490e6616f0c49a060be00741a7aa41c92ead4f807bb82d92f435f1bbd4531f1a013470e38acde153878995b72eb12dd75d0cad04a3662a198ae7c469d44809a5d0f25188770639d70ffd828c654a699f2fe2c1dedfbd2da7993f9bda6d6a9f02e839844b1a9cce647c83636dccdbf6bd53d488483d1bb15cddc47546e95a9e779a0ffd0adc8e6f563c9660a7a8353d9122ab74d057ca88f5998a13c008fd9c5f01c49914fbc742de8c3671350e6eebe0288c8b9f780f1f3e489527f0017d295cad698220a80def545082a271665b8c0ea8204b2806aed063da5deda655143b30d9ef206b938ac322ade9ed92bd64df4e4a8df605a74a7132764b13f43b738e5401b5f6953a1b93808d1ddba2650e263e1d547875557b315eda599989b6da3446145f1f29d1712aac487cd80bbbba9628d45b1369a3110d05564ac439ad9bd82008651ac819b9d320c63f367371d0b8bcd3554cd38f7bfd951fbcf5f541574e09dea4b20d093b1dd3f37d59c689c2621f42924b512b0780a8f6d3d42286fa36d8aa59309258468dff86ee5ebe641eecae1688861cd21d3725c21b410e11902a1918191dbf4c2625e132a4f0b31a056b7dfc499fdb6c987b2cd8090403136409d6d1d7e1d2a5b442d82deaab7b65d30551b153c55ee9df02754b9e977cb66d7b404840e5058664f187223253153a90f0e9815b1bd0c075d6ec729ab62e2fc7d7f50649616d362d4ca37b800fb01a422d109bfeca5fc9a3080f6e2bf9391a2faa89e3226b4e246506910e817d89f233e7710c53e51b3b9c629501e2740903d6737a184d38c82b601695af05b661f806fe28346c0a25392d56b7dc75c5cb766e1a01cb3a6b3d982a81087527fe9c9f82207db72e242ec637cd1209e4392e1aa9dc6453b376d51f0c5b07328b8a02d3b3d193e5585ed3f8826017e74a5833076dc4bda06710fd230cf5472244a7a6597a2f59fcd9f7fc7c7acebe20ce7f5d1db90853b78195ba773bfdf7af3c77d0df0a225caa5a1f1fed57111f9da33095d6034a9f60ae5ea1ed58353e0bab453fb2f3ff9debbc103ccf0f598a1235f35b12d7eff2ae1b6f169802546223e4d0c59c1aa8008192e9d97d556b9538a271112d439fdb791d1e736db9f75891109d5f95a73e52aa2e4a71fcf5c8e1eefb27d29d2d63c0602cbf79a6febe0f7eef74326ee325be070f53e0139d938de0c3f9f1d4865a00de2b014541cdade4d4b8172ad99dac385644b0c1b9ca885c620fb1b477d4c935ddd657f59ff0e4158ee2f0f5e9b0d2b1bf671c19e72c11b151f6c5379eacd4daf9ff20788dcba326571ebec904bf2a9712ed3b9f7920a11503173ae8fda8840efeafe701379a4ec13c7a9509207fd94ae602d2c0c2f7e4f3cb835efdca15e2ccb6daec78667a56970efc6294b4c3b26027e7cb30be257ef8594dba56cfdd0d18b7087b5c62f5f18c2f02e90e617e55eb3c4ef6dcaf132f2c6b27e7e32aa6f179d763648e8ec02e9980e41ed6e43295502e3e7c07536f2f42f7288d54cd10e786928f33d1d5ed7deb14411162638d17e51b7bfd7fee7ceb31aa351ea4fa45d82c08697c890d60410e0eef7414340296f6fea88acbe949dc1c10cdf2315a8327905ac192d426c05b96dde098a4e75e45d588c3f192920286e5f703ebf4cc5c2bebfff830487afdc1c1b60857be3e9dd4094603255aa5e482809b1de935371fc1f5d27e2ad3c9fb29163d02b4da6b1e263c3c22ddad3805ac57a676a9afb2fde42dfd5cd8f2cc1dff167f558632b19ca8c72414aee4fbc6923de2662f6902788053c738e5ef3cb46da03d01f313d1ff370af2af05f8d731b4115bae6006c869d20c6cd1086e18ac0bde69e3f8c6ee4c029bd3f78251e69fe0cb3db17af4da2ed2f6ff8de06a6089ad3bee3c674048cdaed343a3cc03e12f788f21089d243a5280c5008b92958143de0e157bfababfa2455abef142fadf79f579b17f00a157d3dd10131d1cf785e1a26e2cad2d88d998d5d1bfa5338fc9efa1499104b235d24b1fa602473c9791511104d56c3659d8f11b33fa52d844e50d8ba285b0f92c45989eb2344849662853c85739b247c2d2e457173a8240e49d52578b25eeb62bae3454031294187d9e1c1a3b39976b926084afa3951a76bf1edece510d448d25de8576a1c7458d3cb09eede95ca13033282c10924002d85f0fddc971b877eaf1bb560e35b9d9b03d9225f2f08cf0b88086a2b4b80f3f92cb66fca0d762c7e0c2dbd019b976c06fe8cc3c37eec7a0452eb78d8efadecbbd9f90de810788a893371d56e566dcbf002ff9d2bca7920a16ffa2903dbc14f76742a9b0704a36fd5f2460b01c1dbd2380d1ba0d13755ecf56e5d4ec240c4e90246f66b4249996ba02fb99c01f6860f377097d46dbb68aa36716c2e9303a22ffc72b137c82bc3af310309fb01e239c77dce6a4261b9991f9c42d2edc8e9d5bbf1432af056fd9252ce4a246f975b2d9cc5667a4f8e8356bbd939e8af40adcc70426aa7f2402113e258c38ef8b6fae9cc562f0bde0a085596403cbc2b28fbda5eca03220331f890645d66852e922e2116bd6a25a39f406736c515510e1924b579786e8423f7d9967369f6a7e6acfb215e8315ee866131f2ce9f9915f84983ece24a46aaf5e7a1a55f60948a638e05632c3bafa53fd7fbe097cbc64375460d815e1b7d760ade41756f211df69759caa8e1d667feeb58fd92d2ec34d71634bef15407466709ad95026d8c43113a6e3249a2ffa85f814ef12d6fefa4ac84894620c2cf75939f5d6fcbf28c7a16843af31c6b495496ef28b983734aecfd2e50add15df71bb5f9aa0cc19929b1c010ceca2ba78b7991352739c8752b4be3a1ccb34580c5c205646427a3a1ef265e9a99a0c24039bb8fb9129d87e747f642a0bbe6a01740947fd49822535539048646065c305ef52c886e98a593b4e07a84da9015c64514f73f4b1c41af52998008a64e5a4df701424055c7ab631d3c9ffef2d0e64cc8ba8503db7b72063ba0ed817d6265f845b6055099c47d6bb862a3274b6ca20590b22cad81c6e3736f36e78ba458919b1c51f4afd539e71080e7397811d2dacea20e8cc7c8e8cf2a00ef19f1e8a1cc1b0852941a3a889a0f06c077cbea2a1c1ef57ce8a637a1c78bb693617a0aeae70210c5cf02bf59d6807d6276a31a600c3292df63efade3dc29596590f80ee03c80096b02bc97310ff9c6f776f0925193b32dfe71e4e37ec0a56894e4e7f59842c28cf16d96732fccd1da134b54f1ae3bd0cec2faf347e", 0x1000}], 0x2, &(0x7f0000004c80)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff9}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1000}}, @mark={{0x14, 0x1, 0x24, 0x8000}}, @mark={{0x14, 0x1, 0x24, 0xff}}, @mark={{0x14, 0x1, 0x24, 0x200}}], 0xa8}}, {{0x0, 0x0, &(0x7f0000006340)=[{&(0x7f0000004d40)="22f49441aca8061b9449076eb9dcbd0bb98b5fdbaa2a2e7b6531de3c10846786d08ba694cb4c248e808829254d1c91ef7c1c9799dc8c2fad7d04cc22e1a487497e594c90e1b037ae61897aec05a8a879f20150d043951b7fd0328faeb9db9aa05123b6c8ebe655f0d8a01ec2de97fab5adb49ff9d384aa512188e33925f477ce6d6c0186c452d9e4bc9d100df35b18b590dfce508fe08fade5f489b76bf059e4ca73ccde180875fc20c6a2c337d761a18b16ec49b36a2d64e0323d49c30850d4179613bc91591f", 0xc7}, {&(0x7f0000004e40)="3d2ebcf5e5429df9ff4baa71a1359da2c01786977a5f77031f2544395298ba470ee6fca6ba1682cb1095b73939b33555419149023ade2a6a6df6b4e685dc0f39ae57204fcaeeb1cb8fa066b044be172672dfed2e5b2135c449c9dd1f337579afb304726315afea31f06a99bb9eed146a1282619c243a3c261df3fe2ddba3a12ec9e6180b3c87d3e33ff17052c55cb3be04311ed971a7691f0fb59cce3d6cbd87eaaf1273ea73b72749154d4646aaf974e7f47d64c12c29647fbf52dfa7752a3ef71a6f1863ef88b2f61a378a7123e1", 0xcf}, {&(0x7f0000004f40)="1501cfaf36ae0d7b3aafc95c2974807c5879e2f80254908d8e9d31b6a0c94f42b4a3dede5f2db7ad380b38b7c85a4fb6052c3e6875c54583dd9eb50f54456ca636921d4f7443f9c275d868e02f7cdf82ac1df18adf6606e825dbe97e622e570d836b1e2a1fa7e54cc8972157016c424be7d251885e84ef9a1e83fd5f4342367c74", 0x81}, {&(0x7f0000005000)="3dccaf4cad52e0f4f39574d5ab7cd379367ef3a3aaba7ae1e39391c7236ce4d5d3dd2eb2ecb3dca1bb092cc207828c72ddfe82f71db9e6cf107e15f9bea0d35f7c6824ec99766d5aa5bb2cbd0ddbe52a33c8fbb9dfcb4aa39d9bc4fa3479f9bafe5ebb156271d4c732239a35110f543d49c1fe5c4c828c2579f660d8bef661e2", 0x80}, {&(0x7f0000005080)="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", 0x1000}, {&(0x7f0000006080)="6b97477228b19d2f2477688c80a8862da9f3c57e515f49b394e867292d115a6a93aa25e80ac44a6e6947c578a2118db3250d78895b0692bdbec966684750009f20fa28f72fe2ec89d97178a4f097de4a526bff5f2e6a4b2804d9439f4a8eca3f4d355e8867514e5a446e73003f2987eb71d6ab296900e743a91da446fdce3cba9a949d09fa7eb8faf1cb820d121794a3c3e222980f9a2d160812120907a0c3392ebf183ef06613966ce5ef06e797f282ed8834b9037c9ade599bee2869808cf307323d192f6edcb3ee448ac45caf530e", 0xd0}, {&(0x7f0000006180)="20c34e9867544580c41985c234bf5be1bb231a16113adf981e05612e5631b9926d0fc8c9b63a32cc7583bd0112ff61bba09e14106b99bbb205f223b24b569e2449f5f6e148276d6b8c7714d5545286decebc04dc1cec789b41c0344903009090dc5444faa33ceea4ab577f9607aaf355d9f9b95f509d24e30ba51737944fc7cf0db6b74fe231947516fae4369efd2dd412802b1850e60ca5df7215ee4218e6a7db", 0xa1}, {&(0x7f0000006240)="e9ae167516ec23f8ccfc8f964a134855ef846f44830bc92220573312f2c8a5b0c8c0f1f763a37c755c3a1550613e6b6df88f26067254254997544307152f1582670b3c1860bf0c8152fe764ab86daa06f31aad1b63624533df6b3d7e1ada2112c51f597d585692fae185ab2db629d4c014e596721f7de95684496d6015e03133400b8e8007fe89d8bb8b0dbdd32eb35ffb33f28a3c0f0c2ee65035a4942151e0a545bf7368305e428dfd954850a6c4658052910202556c5434599378791d268c673f6ef1ca673fb1ab5784c1c416753c5d1e938c2bf6d27591d0a1f6503c867fe614cb77ada066e8", 0xe8}], 0x8, &(0x7f00000063c0)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0xffff0aaf}}], 0x60}}, {{&(0x7f0000006440)=@llc={0x1a, 0x302, 0x30, 0x3, 0x8, 0x1a, @broadcast}, 0x80, &(0x7f0000006940)=[{&(0x7f00000064c0)="421a7f2b42d5b42e8a393995e7fb82c7c7c83a747fcb899372d1d2c651011e6596ccb3cb6f667d70c7d57e3c578947f7f229aa9fb4b855eeaf11bef319329effce7309467899931b0390a1668f70ea35bec3a7433d5156ebc827f8a07abf4022844362ab517cf4c8", 0x68}, {&(0x7f0000006540)="94689ff10bc644bfc6c14fc892b896211af3bd9cff36198d4fd302fd05cfe9d083cf18846d99a59eb50c9e3e2cb9c5d3551b8817a1138f3a4f9c943438c746d78cf62b9696e365eaf2d08ce02c768feb0910e8f7e574f38b4195654df118a2c6d169d052b23f4150e02fef9f9c0fe1c526980a94d664667090682a4ee6cc25d48ff6073bcf80127e1b22f69a81d53fd420e597be8181112f4e11acaff6a4389cf67da30ba0b809ea8de2fa2497601eaf4f90cc3121c4f59d4cf5aae4da797e76b23867ef617d7c738f5e9a4e671edd4b95287a8214f482bff4b3fc0e44731e5642ffe354be560286fb0f1e495cdcf588050a0ce54770d3140881", 0xfa}, {&(0x7f0000006640)="7aef2e6bf4a009d777c84b77db67ff5bd3dc3d5a547420430a3c8e78346c56bcac66b2857d38f17b6b7397a829f414c325296728d9611366f245d354dfe05f53115038f2d305de9bea80f05030ce", 0x4e}, {&(0x7f00000066c0)="55c7de8b7f035221f023bd2084ecdb5f691928191c16de35aa971f62e745f337d7152f02c813e0afd48aa186f45420efa0e3c87c045ec82ff8dfeaae8fb7b5263a169e", 0x43}, {&(0x7f0000006740)="e62705d343319733f8a069cbff16b80d50512207808a972b960a70b04a96e48caecc4f43e34b36e198f1fa3fa50d11de12b387a1c3bebf899113c7b44aa405e7714fbb4b252f3b329f97936b63bda2519fee699ab245590323fd5ef6e2170b4c97d9d62dc9d1c44dd496158a70008dd4ad10aa4893d40b3b30204cb67f6c13059fa42a94bade59d7c631521994e49c6c136cb4dc4331895b05cd6b5accb81b37bfef74b91042bd101854c78ff699c497d1299a8810a535cb28", 0xb9}, {&(0x7f0000006800)="b2b2142863df4c2c42cc249668993dea2f7e7c8bca96e1b7e40de916a57181840de6b51c4df7c3f96a2260ed15dd075be5488636ad854d8a9640c5200ee6c3f6ff5094a5725869477b7ee2c77efcfdc70dc98ccc9d4c11f7a4d012c3aa888b72dce80e9d8243dd639de5d8894339d1411a1ae996cbf01d3073d2ebd3f179b620d7afa2e74378241709ed0ca655b6e856ab52dfd46783ced66d1ccabd08df6cb351fa7c23d2b01eb7ab5ef54fa75c9a55748522ac04a0c4630fc3f55badf245651b3d32ae98a2adf63d3db8e5b5af97ffeee65c74831c17b9f2542cc0f6a37ce8420f67b161952ca98f3f40cdce2423ae", 0xf0}, {&(0x7f0000006900)="da8ec17670c92f8c19ed0edd", 0xc}], 0x7, &(0x7f00000069c0)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x80000000}}], 0x48}}], 0xa, 0x10002000) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xe910010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_UNIQUE(r8, 0x40106410, &(0x7f0000000300)={0xbb, &(0x7f0000000240)="d94534c514304fd34810afd827da4a62d93c3f33eaab6d9c6573b3967ed984e35f860584d27e5ccc22b56a703b5b53b02e8ed52575ec9c92d02a3bdab14162b67b7c71819a4baf8e2045203629f0bad4eef834468f4ae4a927d928066bbaa8874943ed013b5b3c6bd3e21b651aa3e7d67ed0bfbab546b8d60fe42a6e91bb2576fd47a933dd2184a2c67a8b0b41497ca3468ce7a25af3756511ccb98194ff9915eb6a37fbd7271bf60e92be25f805a80f69247a69703c8d7ed548ec"}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2407.920982] Dev loop4: unable to read RDB block 1 [ 2407.929995] loop4: unable to read partition table 07:57:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCX25GCALLUSERDATA(r5, 0x89e4, &(0x7f0000000140)={0x5e, "34e06e4f4d5f979dbcd98711c07afa4af9062a20b3e0ff984fd988b455d4c3cfbc4788720b7822d4b061072e5cd1a9b7296a2188559725e04691073db2e25ec3559fcf17bea3a2972d9d8726c46f96681c3a1d5454e79a81228a60358a8f05d45197062f5954fe359530fff2034829e48efb66c2e620a70be5ce0697c7e8c06c"}) r6 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r2, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r9, 0x0, r10) vmsplice(r10, &(0x7f0000000940)=[{&(0x7f0000000000)="e7935a06da75d18e3eb5f31c3e7e9f2db15771a130a990e8", 0x18}, {&(0x7f0000000300)="6722ebe7c1963a43fb71feab3450437ecf77434654a221f80b6ca29bed9d0d2c274408058af143218110a8f4934301446c459da02a0b30287178d5a71778c2c62c89153179df1082885474faf9e5de8662c065d96ba4e9cbc3e18e225479f0198afd242c61c648cc352685248691549f56d981f875b4e7822029aa1cea77857935dcb3c808e05743d54c2fedca91bb3443d23c7a0a0d8f6435e65dd6a939d7c84552c39211e63b9e1d48456f51aeb98fd849dba5a235ba119599ee05dd0a7a02b04853efb96e0c389d88ff40af71e7673d7691e15269337fec53c908941076b5eaa0142c9319dffdc135a7fb5da581a268c817b222e574", 0xf7}, {&(0x7f0000000400)="015629ec4623e166972fb7f2d71f47bcf35232b2a1076d4245ff485457e20ba32277e6b42b94bad0114b9561c96330e8697f0256dbd66f2abe96668a56c453d693f5e4a1348cd1434b60d9cd1300a09cd213cdb47cdf0dc5518c99f18825a797a35bcb127b2f812d0209cf449e0d0e4cd8c5", 0x72}, {&(0x7f0000000480)="cc10521f42df371681d3c593c789e7ebf77a225c8e7c92590f869778361612eb678dbebbbd9b259bba12a89ebbff1038b405b3339124887c440c3ed87da029472ce36dde", 0x44}, {&(0x7f0000000500)="b5e533d8eab7c661c55841e64f273160267b3d50b82e0912b4fc12b154f5b0fb7813c6dd9adab7ba79604ee7fed714b7671fca7474eaee874c38d70d07792e77a7079c78e56144244a7fc0a9a1f1a59a24ba59c65a5d1a76fa30fc546ff1fc5b137a8521d395c061d01eb21ca1dd5799b0cb2accb9635f4634f5ba6e85be5da1c6eef29c9ade06007f6bccbeedd77ef9e55d9fc8a721339a9550ca4fe37912313fb531492dbbbcdcace402f8ad1322d3348497a643d8ab0e914aa6c47456acf13daa79b0e8c562f4fe6c111957a933225898", 0xd2}, {&(0x7f0000000600)="270a8b2b573d18c28799adbacb875b3f90afd8d917f0a3f0349daba8240f86a297a1de969a756b8d9f360e543f269a602cf69142d22a079a3f609a9eeb0cb9fc70491a001c32c2dec5dc18e247a4e76ca3a58f8bead9c57a5cd6073e4d60f5cb656b73efbd338b6108e4a41c9c05284b1d24c54f928a9a9f195f6915c54fe2e7360ffdb422c89c4f44265fabb95348cc37689579aa79504429600893b10385628207a7c90e9444fef4468a189d1ff4d44d73d5fb1e96cf9b19", 0xb9}, {&(0x7f00000006c0)="88249a98f88388a3e834e3710fbcf3e779d0a11ed00e7abd76b7627f9a6bea508672259c606d5ee31a2647f7f6677ab53f27b91d2a8cd6a34b1bb81009b875546d93e330eb1c3eca6d96cfb0bd3489e7ac6e24709ec83f17fc9b88799c55acae5a675a6f0d452cb8e6dd422f892526d050bbb3e16eaa1c0d18c777755de4d51b628cfe5f47fe3b5e532449497a77771c71b0a080865735127b3e8f515b5736", 0x9f}, {&(0x7f0000000780)="1d1e83b691f619a99583158271c250f6feb1ca75a328f470671d859161e828dbdda6ec476bf232ff6835f2eb154f499d3a9aae97d556f50818c480a54ddae90a0c76d5491d918b5ccd45f424d81c598e9e5f1a3d810817f6921b13abada9e31294dfc3d4c00ed32b9d48ca907f443b0009fcdc1dcd076491d6d517aae1ad413f2aff394708abbaca27537bf57f65d6a845bb5cc13e7c9636c7244f8f1845e00be11c7c70c0cc5ebaa0776eab7e64470a2dc136eb9caa962c83a62eb719e787741546a4385d90e24c7e018ccd9461e0a494152ceaf210bade8a56525c5aaa67", 0xdf}, {&(0x7f0000000880)="8d7d3b66b4dd3cce214e2180951374c4c23bfda76f6c7cf37c9dd00faeed6ac78b11838d4f940016ea091101afc41faece5c8fa9e7bc99ca20c02b96d1d6989652a80c3e9d60fe065494e5a00ec33b099d7d8a3e1c399aa8968d8a005c029aaae3c898f188b8e7dda09987947fd076b01c65d5076a51d6291bfb62267c4f5a03cb8d2c3e3ca2579b00b7c7", 0x8b}], 0x9, 0x4) r11 = socket(0xa, 0x2, 0x0) r12 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) setsockopt$inet_int(r11, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) setsockopt$inet6_udp_int(r11, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) r13 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r13, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) sendto$inet(r11, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r11, r12, 0x0, 0x10001) r14 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r14) 07:57:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000080)) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f0000000000)={0xff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2407.989365] loop4: partition table beyond EOD, truncated [ 2408.013741] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xea10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2408.114894] Dev loop4: unable to read RDB block 1 [ 2408.129059] loop4: unable to read partition table [ 2408.146838] loop4: partition table beyond EOD, truncated 07:57:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r5 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r6, 0x0, r7) fcntl$dupfd(r7, 0x406, r5) unlink(&(0x7f00000001c0)='./file0\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2408.166366] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:46 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07003f0000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20aa80, 0xfc) setsockopt$packet_int(r3, 0x107, 0x7, &(0x7f0000000100)=0x7ed, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x0, 0x81}], 0x1) r5 = fcntl$dupfd(r1, 0x0, r2) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000000), 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000240)) dup2(r0, r0) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xeb10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2408.384843] Dev loop4: unable to read RDB block 1 [ 2408.393816] loop4: unable to read partition table [ 2408.438911] loop4: partition table beyond EOD, truncated [ 2408.449936] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xec10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:46 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0760000000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r9, 0x80045503, &(0x7f0000000000)={0x9, 0x1}) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2408.566436] Dev loop4: unable to read RDB block 1 [ 2408.571438] loop4: unable to read partition table [ 2408.586076] loop4: partition table beyond EOD, truncated [ 2408.604044] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000080)=""/237) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r6, &(0x7f0000000240)=@nfc_llcp, &(0x7f00000002c0)=0x80) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80010000) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x280, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000001c0)=0x9, 0x4) ioctl$TIOCLINUX5(r9, 0x541c, &(0x7f0000000180)={0x5, 0xca80, 0x400, 0x7, 0x4}) 07:57:46 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700400000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2408.775439] Dev loop2: unable to read RDB block 1 07:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa, 0x9010, r0, 0x2095f000) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2408.802362] loop2: unable to read partition table [ 2408.818615] loop2: partition table beyond EOD, truncated [ 2408.826777] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 07:57:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fcntl$getownex(r8, 0x10, &(0x7f0000000080)) socket$packet(0x11, 0x2, 0x300) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200, 0x0) r10 = fcntl$dupfd(r5, 0xce6005ec52613ca2, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$sock_rose_SIOCADDRT(r10, 0x890b, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xed10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2408.962212] Dev loop4: unable to read RDB block 1 [ 2408.983748] loop4: unable to read partition table [ 2408.988862] loop4: partition table beyond EOD, truncated 07:57:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2409.014096] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2409.043589] net_ratelimit: 19 callbacks suppressed [ 2409.043599] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.053766] protocol 88fb is buggy, dev hsr_slave_1 07:57:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x1000000, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000240)={&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000001c0)=""/5, 0x5}) getsockopt$inet6_dccp_buf(r4, 0x21, 0xd, &(0x7f0000000080)=""/223, &(0x7f0000000000)=0xdf) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2409.079389] validate_nla: 10 callbacks suppressed [ 2409.079398] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2409.125481] Dev loop4: unable to read RDB block 1 [ 2409.154035] loop4: unable to read partition table [ 2409.159351] loop4: partition table beyond EOD, truncated [ 2409.176609] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:47 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700420000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2409.203609] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.208836] protocol 88fb is buggy, dev hsr_slave_1 [ 2409.217846] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:47 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:57:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x21f}, 0x1, 0x0, 0x0, 0x40}, 0x400c814) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x20}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000440)=ANY=[@ANYRES32=r5, @ANYBLOB="1410008f15bf9054049cec"], &(0x7f0000000480)=0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$KDGKBSENT(r7, 0x4b48, &(0x7f00000001c0)={0x20, 0x2, 0x1}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r6, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000100)={@local, @multicast2, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r9, 0x8936, &(0x7f0000000180)={@rand_addr="ed3629568dbd03494bead54dbd83d654", 0x20, r10}) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket$inet_tcp(0x2, 0x1, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = socket$packet(0x11, 0x2, 0x300) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = socket(0x40000000015, 0x80005, 0x0) close(r17) r18 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r18, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r18, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r17, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r19}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r16, 0x84, 0x17, &(0x7f0000000300)={r19, 0x1f, 0xbd, "06e2f57f1d0749703a7bdb242c2cc0ff99779c2ef8fb74ebc598c6dbe2c539e2b97a9846b48cfc51b4ab3ca8df7ba88312fb0f5d3e5360fcd4a9dbd7397cce253c61102b44730af859260ce6ecfae88795456a285fb7f9e846f30f498a03754252d2a134a10ff79d83878553eb1c954a1fce4fc870ca892e8bc6ba3927f53582b662f94e4b88cd5f1110d6f349ae0dde5552dc6823d38397206d1b4ce1136da926b5ffed3b2bd63fefd44e8061008ebb588e835f59a6800843a5332aa3"}, 0xc5) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2409.370608] FAULT_INJECTION: forcing a failure. [ 2409.370608] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.388031] CPU: 1 PID: 5604 Comm: syz-executor.2 Not tainted 4.19.80 #0 [ 2409.394921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.404578] Call Trace: [ 2409.407202] dump_stack+0x172/0x1f0 [ 2409.410861] should_fail.cold+0xa/0x1b [ 2409.414797] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2409.419925] ? lock_downgrade+0x880/0x880 [ 2409.424109] __should_failslab+0x121/0x190 [ 2409.428369] should_failslab+0x9/0x14 [ 2409.432553] kmem_cache_alloc+0x2ae/0x700 [ 2409.436732] ? iterate_fd+0x360/0x360 [ 2409.440548] ? sock_destroy_inode+0x60/0x60 [ 2409.444879] sock_alloc_inode+0x1d/0x260 [ 2409.448953] alloc_inode+0x64/0x190 [ 2409.452593] new_inode_pseudo+0x19/0xf0 [ 2409.456757] sock_alloc+0x41/0x270 [ 2409.460308] __sys_accept4+0xe2/0x6a0 [ 2409.464125] ? wait_for_completion+0x440/0x440 [ 2409.468718] ? __ia32_sys_listen+0x80/0x80 [ 2409.472964] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2409.478513] ? fput+0x128/0x1a0 [ 2409.481803] ? ksys_write+0x1f1/0x2d0 [ 2409.485617] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.490566] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.495330] ? do_syscall_64+0x26/0x620 [ 2409.499311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.504679] ? do_syscall_64+0x26/0x620 [ 2409.508665] __x64_sys_accept4+0x97/0xf0 [ 2409.512737] do_syscall_64+0xfd/0x620 [ 2409.516553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.521837] RIP: 0033:0x459f49 [ 2409.525038] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2409.544740] RSP: 002b:00007f0ae56e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2409.552553] RAX: ffffffffffffffda RBX: 00007f0ae56e9c90 RCX: 0000000000459f49 [ 2409.559831] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 07:57:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000080)={{0x2, 0x0, @identifier="d29827d245d9277a2c30dd4912923dca"}, 0x9f, [], "631bc6d6bf057847be61f1fb10b68108b2e73f91448c4da861a753e558e60ca75d05a8de7128f7411de80984a604bde497e20eb674fd83741d80cfad1c1bc8fc182b7313fd60791486d564658d30c63311d13e354a963b8ecb94d1d382b42a4f7bf1e333bf6c5f40a116c4221a4ba530882f25db554bf605ef1b6701450aafc33f94ee367afe002a5abc6df2115679d74dd14d105305db9ef614ade005f434"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xee10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2409.567110] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2409.574388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ae56ea6d4 [ 2409.581844] R13: 00000000004c004c R14: 00000000004d2308 R15: 0000000000000005 [ 2409.589461] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.593641] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.594810] protocol 88fb is buggy, dev hsr_slave_1 [ 2409.599746] protocol 88fb is buggy, dev hsr_slave_1 [ 2409.604841] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.614865] protocol 88fb is buggy, dev hsr_slave_1 [ 2409.654989] Dev loop4: unable to read RDB block 1 [ 2409.671862] loop4: unable to read partition table 07:57:47 executing program 2 (fault-call:4 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:57:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2409.703237] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2409.741566] loop4: partition table beyond EOD, truncated [ 2409.780534] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2409.805484] FAULT_INJECTION: forcing a failure. [ 2409.805484] name failslab, interval 1, probability 0, space 0, times 0 07:57:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_RESERVED(r7, 0x5601, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2409.840654] CPU: 0 PID: 5819 Comm: syz-executor.2 Not tainted 4.19.80 #0 [ 2409.847986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.857340] Call Trace: [ 2409.857368] dump_stack+0x172/0x1f0 [ 2409.857388] should_fail.cold+0xa/0x1b [ 2409.857405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2409.857420] ? lock_downgrade+0x880/0x880 [ 2409.857446] __should_failslab+0x121/0x190 [ 2409.857460] should_failslab+0x9/0x14 [ 2409.857483] kmem_cache_alloc_trace+0x2cc/0x760 [ 2409.857502] ? kmem_cache_alloc+0x32a/0x700 [ 2409.867598] ? iterate_fd+0x360/0x360 [ 2409.898270] ? sock_destroy_inode+0x60/0x60 [ 2409.902605] sock_alloc_inode+0x63/0x260 [ 2409.906676] alloc_inode+0x64/0x190 [ 2409.906694] new_inode_pseudo+0x19/0xf0 [ 2409.906711] sock_alloc+0x41/0x270 [ 2409.914286] __sys_accept4+0xe2/0x6a0 [ 2409.914301] ? wait_for_completion+0x440/0x440 [ 2409.914317] ? __ia32_sys_listen+0x80/0x80 [ 2409.914333] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2409.914345] ? fput+0x128/0x1a0 [ 2409.914358] ? ksys_write+0x1f1/0x2d0 [ 2409.914376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.914391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.952904] ? do_syscall_64+0x26/0x620 [ 2409.956896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.962272] ? do_syscall_64+0x26/0x620 [ 2409.966264] __x64_sys_accept4+0x97/0xf0 [ 2409.970342] do_syscall_64+0xfd/0x620 [ 2409.974157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.979353] RIP: 0033:0x459f49 [ 2409.982641] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.001553] RSP: 002b:00007f0ae56e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2410.009287] RAX: ffffffffffffffda RBX: 00007f0ae56e9c90 RCX: 0000000000459f49 [ 2410.016568] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2410.023854] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2410.031158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ae56ea6d4 07:57:47 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0752450000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERY_EXT_CTRL(r3, 0xc0e85667, &(0x7f0000000080)={0x180000000, 0x8, "23c7f049f771f0e840092019369d37a7b77a60497c6cb10ab391ad195d53c425", 0x7, 0x4, 0x9, 0xf2a, 0x1, 0x401, 0x80, 0x5, [0x20, 0x5, 0x16dc]}) r4 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2410.038446] R13: 00000000004c004c R14: 00000000004d2308 R15: 0000000000000005 [ 2410.053018] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:47 executing program 2 (fault-call:4 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:57:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xef10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2410.130056] Dev loop4: unable to read RDB block 1 [ 2410.145982] loop4: unable to read partition table [ 2410.166601] loop4: partition table beyond EOD, truncated [ 2410.179273] FAULT_INJECTION: forcing a failure. [ 2410.179273] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.196789] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2410.236100] CPU: 0 PID: 5908 Comm: syz-executor.2 Not tainted 4.19.80 #0 [ 2410.242999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.252375] Call Trace: [ 2410.254988] dump_stack+0x172/0x1f0 [ 2410.258641] should_fail.cold+0xa/0x1b [ 2410.262573] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2410.267712] __should_failslab+0x121/0x190 [ 2410.271979] should_failslab+0x9/0x14 [ 2410.272070] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2410.275787] kmem_cache_alloc+0x2ae/0x700 [ 2410.275801] ? map_id_range_down+0x1ee/0x370 [ 2410.275814] ? __put_user_ns+0x70/0x70 [ 2410.275833] selinux_inode_alloc_security+0xb6/0x2a0 [ 2410.275849] security_inode_alloc+0x8a/0xd0 [ 2410.275865] inode_init_always+0x56e/0xb40 [ 2410.275881] alloc_inode+0x81/0x190 [ 2410.275897] new_inode_pseudo+0x19/0xf0 [ 2410.275913] sock_alloc+0x41/0x270 [ 2410.275926] __sys_accept4+0xe2/0x6a0 [ 2410.275945] ? wait_for_completion+0x440/0x440 [ 2410.329062] ? __ia32_sys_listen+0x80/0x80 [ 2410.333393] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2410.333405] ? fput+0x128/0x1a0 [ 2410.333420] ? ksys_write+0x1f1/0x2d0 [ 2410.342229] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.342246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.342260] ? do_syscall_64+0x26/0x620 [ 2410.342277] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.355604] ? do_syscall_64+0x26/0x620 [ 2410.355627] __x64_sys_accept4+0x97/0xf0 [ 2410.355642] do_syscall_64+0xfd/0x620 [ 2410.355660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.355671] RIP: 0033:0x459f49 [ 2410.355684] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.355691] RSP: 002b:00007f0ae56e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2410.355704] RAX: ffffffffffffffda RBX: 00007f0ae56e9c90 RCX: 0000000000459f49 [ 2410.355711] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2410.355722] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:57:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000140)={0x4, 0x0, [{}, {}, {}, {}]}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCX25SCUDMATCHLEN(r4, 0x89e7, &(0x7f0000000000)={0x38}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) set_robust_list(&(0x7f0000000080)={0x0, 0x6ff0}, 0x18) [ 2410.365047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ae56ea6d4 [ 2410.376935] R13: 00000000004c004c R14: 00000000004d2308 R15: 0000000000000005 07:57:48 executing program 2 (fault-call:4 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:57:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf010010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2410.540846] Dev loop4: unable to read RDB block 1 [ 2410.545811] loop4: unable to read partition table [ 2410.545905] loop4: partition table beyond EOD, truncated [ 2410.576707] FAULT_INJECTION: forcing a failure. [ 2410.576707] name failslab, interval 1, probability 0, space 0, times 0 07:57:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20001, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f0000000140)=""/216, &(0x7f0000000080)=0xd8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2410.601338] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2410.629896] CPU: 0 PID: 6167 Comm: syz-executor.2 Not tainted 4.19.80 #0 [ 2410.636796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.646169] Call Trace: [ 2410.648782] dump_stack+0x172/0x1f0 [ 2410.652433] should_fail.cold+0xa/0x1b [ 2410.656344] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2410.661463] ? lock_downgrade+0x880/0x880 [ 2410.665650] __should_failslab+0x121/0x190 [ 2410.669898] should_failslab+0x9/0x14 [ 2410.673707] kmem_cache_alloc+0x2ae/0x700 [ 2410.677852] ? find_held_lock+0x35/0x130 [ 2410.681903] ? __alloc_fd+0x44d/0x560 [ 2410.685696] __d_alloc+0x2e/0x9c0 [ 2410.689141] d_alloc_pseudo+0x1e/0x70 [ 2410.692950] alloc_file_pseudo+0xe2/0x280 [ 2410.697085] ? kasan_check_read+0x11/0x20 [ 2410.701228] ? alloc_file+0x4d0/0x4d0 [ 2410.705015] ? __alloc_fd+0x44d/0x560 [ 2410.708818] sock_alloc_file+0x4d/0x170 [ 2410.712780] __sys_accept4+0x259/0x6a0 [ 2410.716658] ? __ia32_sys_listen+0x80/0x80 [ 2410.720881] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2410.726422] ? fput+0x128/0x1a0 [ 2410.729691] ? ksys_write+0x1f1/0x2d0 [ 2410.733491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.742316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.747061] ? do_syscall_64+0x26/0x620 [ 2410.751022] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.756375] ? do_syscall_64+0x26/0x620 [ 2410.760341] __x64_sys_accept4+0x97/0xf0 [ 2410.764390] do_syscall_64+0xfd/0x620 [ 2410.768182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.773361] RIP: 0033:0x459f49 [ 2410.776561] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:57:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2410.795459] RSP: 002b:00007f0ae56e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2410.803154] RAX: ffffffffffffffda RBX: 00007f0ae56e9c90 RCX: 0000000000459f49 [ 2410.810407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2410.817662] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2410.824916] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ae56ea6d4 [ 2410.832168] R13: 00000000004c004c R14: 00000000004d2308 R15: 0000000000000005 [ 2410.872730] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(xtea)\x00'}, 0x38d) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xc0895}, 0x400c814) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000000)) bind$isdn(r1, &(0x7f0000000080)={0x22, 0x20, 0x60, 0x20, 0xd9}, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:48 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700480000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r7, 0x0, r8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x100010, r7, 0x0) write$P9_RWALK(r6, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r9 = dup2(r6, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r12) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r14) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r16, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r17, 0x0) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r18, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r19, r5) r20 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r9, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r10}, {0x2, 0x7, r12}, {0x2, 0x6, r14}, {0x2, 0x6, r15}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r17}, {0x8, 0x1}, {}, {0x8, 0x2, r19}, {0x8, 0x2, r20}, {0x8, 0x4, r21}], {}, {0x20, 0x4}}, 0x84, 0x2) r22 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r22, 0x0) write$P9_RWALK(r22, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r23 = dup2(r22, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r23, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r26) r27 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r27, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r28) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r30, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r31, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r34 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r34, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r35, 0x0) r36 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r23, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="02000000010002000000000002000000", @ANYRES32=r24, @ANYBLOB="02000700", @ANYRES32=r26, @ANYBLOB="02000600", @ANYRES32=r28, @ANYBLOB="02000600", @ANYRES32=r29, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="040000000000000008000700", @ANYRES32=r31, @ANYBLOB="08000100", @ANYRES32=r32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r33, @ANYBLOB="08000200", @ANYRES32=r35, @ANYBLOB="08000200", @ANYRES32=r36, @ANYBLOB="080004006cdbb2746df0f1b7fcd6015f10956be9cd2ec18a870df0095e256ce666dc67307e7885db93595f767ef90eecf86f1323481d243293378701810b2e72f6906530325b43ad578131d7eb0d472a040a0dac2e39d34cd9a3381272de321e9d30304febbfd7d072b3e0fe81703b8e5a1ddafeba3d94ed3a66a5b9293f9f651646154838a9aa0a7049febb22310b68c8", @ANYRES32=r37, @ANYBLOB="10000000000000002000040000000000"], 0x84, 0x2) fchownat(r4, &(0x7f0000000000)='./file0\x00', r10, r35, 0x100) 07:57:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:48 executing program 2 (fault-call:4 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2411.021292] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2411.100517] Dev loop4: unable to read RDB block 1 [ 2411.119299] loop4: unable to read partition table 07:57:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2411.154483] loop4: partition table beyond EOD, truncated [ 2411.169856] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf0ffffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2411.197901] FAULT_INJECTION: forcing a failure. [ 2411.197901] name failslab, interval 1, probability 0, space 0, times 0 [ 2411.233755] CPU: 0 PID: 6518 Comm: syz-executor.2 Not tainted 4.19.80 #0 [ 2411.240654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2411.250203] Call Trace: [ 2411.252814] dump_stack+0x172/0x1f0 [ 2411.256641] should_fail.cold+0xa/0x1b [ 2411.260545] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2411.265667] ? lock_downgrade+0x880/0x880 [ 2411.269848] __should_failslab+0x121/0x190 [ 2411.274094] should_failslab+0x9/0x14 [ 2411.277908] kmem_cache_alloc+0x2ae/0x700 [ 2411.282077] __alloc_file+0x27/0x330 [ 2411.285809] alloc_empty_file+0x72/0x170 [ 2411.289892] alloc_file+0x5e/0x4d0 [ 2411.293543] alloc_file_pseudo+0x189/0x280 [ 2411.297870] ? alloc_file+0x4d0/0x4d0 [ 2411.301697] ? __alloc_fd+0x44d/0x560 [ 2411.305525] sock_alloc_file+0x4d/0x170 [ 2411.309603] __sys_accept4+0x259/0x6a0 [ 2411.313532] ? __ia32_sys_listen+0x80/0x80 [ 2411.317785] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2411.323341] ? fput+0x128/0x1a0 [ 2411.326637] ? ksys_write+0x1f1/0x2d0 [ 2411.330462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2411.335270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2411.340041] ? do_syscall_64+0x26/0x620 07:57:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400205) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2411.344027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.349404] ? do_syscall_64+0x26/0x620 [ 2411.353400] __x64_sys_accept4+0x97/0xf0 [ 2411.357481] do_syscall_64+0xfd/0x620 [ 2411.361740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.367056] RIP: 0033:0x459f49 [ 2411.371915] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:57:49 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2411.391876] RSP: 002b:00007f0ae56e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 2411.399958] RAX: ffffffffffffffda RBX: 00007f0ae56e9c90 RCX: 0000000000459f49 [ 2411.408901] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2411.416202] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2411.423484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ae56ea6d4 [ 2411.430767] R13: 00000000004c004c R14: 00000000004d2308 R15: 0000000000000005 [ 2411.487308] Dev loop4: unable to read RDB block 1 [ 2411.492242] loop4: unable to read partition table [ 2411.513783] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2411.530881] loop4: partition table beyond EOD, truncated 07:57:49 executing program 2 (fault-call:4 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:57:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = dup2(r3, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xffffff8c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000780)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r17, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r18, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r21, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r22, 0x0) r23 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r11}, {0x2, 0x7, r13}, {0x2, 0x6, r15}, {0x2, 0x6, r16}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r18}, {0x8, 0x1, r19}, {0x8, 0x0, r20}, {0x8, 0x2, r22}, {0x8, 0x2, r23}, {0x8, 0x4, r24}], {}, {0x20, 0x4}}, 0x84, 0x2) setreuid(r10, r15) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r26) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r28, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r29, 0x0) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r30, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r31, r2) r32 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r4, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010002000000000002000000", @ANYRES32=r5, @ANYBLOB="02000700", @ANYRES32=r7, @ANYBLOB="02000600", @ANYRES32=r26, @ANYBLOB="02000600", @ANYRES32=r27, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="040000000000000008000700", @ANYRES32=r29, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r31, @ANYBLOB='\b\x00!A', @ANYRES32=r32, @ANYBLOB="08000400", @ANYRES32=r33, @ANYBLOB="10000000000000002000040000000000"], 0x84, 0x2) r34 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r34, 0x0) write$P9_RWALK(r34, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r35 = dup2(r34, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r35, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r37 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r38) r39 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r39, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r40) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r42, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r43, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r46 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r47, 0x0) r48 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r35, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010002000000000002000000", @ANYRES32=r36, @ANYBLOB="02000700", @ANYRES32=r38, @ANYBLOB="02000600", @ANYRES32=r40, @ANYBLOB="02000600", @ANYRES32=r41, @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="040000000000000008000700", @ANYRES32=r43, @ANYBLOB, @ANYRES32=r44, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r45, @ANYBLOB="08000200", @ANYRES32=r47, @ANYBLOB="08000200", @ANYRES32=r48, @ANYBLOB="08000400", @ANYRES32=r49, @ANYBLOB="10000000000000002000040000000000"], 0x84, 0x2) r50 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r50, 0x0) write$P9_RWALK(r50, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r51 = dup2(r50, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r51, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r53 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r53, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r54) r55 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r55, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r56) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r58 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r59, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r62 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r62, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r63, 0x0) r64 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r51, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r52}, {0x2, 0x7, r54}, {0x2, 0x6, r56}, {0x2, 0x6, r57}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r59}, {0x8, 0x1, r60}, {0x8, 0x0, r61}, {0x8, 0x2, r63}, {0x8, 0x2, r64}, {0x8, 0x4, r65}], {}, {0x20, 0x4}}, 0x84, 0x2) getgroups(0x3, &(0x7f0000001680)=[r32, r47, r64]) setfsgid(r47) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r66 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="050ce5696531c5144d7331282f14cbd98f75f98c763ae2ef7eac8019b8bf01c9e66fbb3322c5571cd20ebe246f5a30b7b66a753e0d17422525f27eccb03c8735745891a0b7864fd77ebe19c60975653672d6a8531e23d92f261d0ac13f729ecc4f76113bd28323a13b05e75e3ead171d96751965d9abee490fcf4331c92062146e0e10f4", 0x84, 0xffffffffffffffff) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="0e82611ce309d31c7b0af8a0562805bb52ab44c56d78b2da2cda332d42355d88faba013944604d6488b592181a171a04565be14f4269b8f73d661f70e4e99e89b7ed1e5c34b82e6b9dd66b55832fec57e7c4df4bc19a02af0e4c0670ea61663765885ca2db92e90107d13fc2ab967105c068a0fc0c9070f36930e786", 0x7c, r66) [ 2411.554869] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:49 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07004c0000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf110010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x81e, 0x40000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f0000000080)) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2411.769239] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2411.807392] Dev loop4: unable to read RDB block 1 07:57:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2411.816777] loop4: unable to read partition table [ 2411.835026] loop4: partition table beyond EOD, truncated 07:57:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2411.861923] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:49 executing program 5: getitimer(0x3, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1, 0x8000) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000e8030000f000000000000000f0000000f000000000000000180300001803000018030000180300001803000004000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="0054443bd07b893c1800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013000000000000000000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000007d0000000000fe8000000000000000000000000000aaff020000000000000000000000000001ffffff00000000ff000000008000007f00000000ffffff00000000ffffffff00697036746e6c3000000000000000000076657468305f746f5f626f6e64000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002c00e10160000000000000000000000000000000f000380100000000000000000000000000000000000000000000000028006d6800000000000000000000000000000000000000000000000000000000ff4101000000000048005445450000000000000000000000000000000000000000000000000000010000000000000000000000000000000074756e6c300000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f000000000000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000961bc09b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x448) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0xc, 0xe41d72bee5ae77a8, 0x0, &(0x7f0000000080)=[0x0], 0x1}, 0x20) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) syz_emit_ethernet(0x3, &(0x7f00000004c0)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="700d930800000013de1875bf57e4193db8ce7da6a7fcfb78fd293a82c008cca727a79d71acd7d36730ad71a5954d04686c5fb80311f98a4cabae06a39e9c449d45ed8515949c6d99c854796204e1753f2cadba2319e5f760e0fba3faae619fe4c84ddbb93ecd99330eafecf1e9789eac5571b50b91802fbb63f8"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x20ccf744f79453c2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x9}}]}}) rt_sigsuspend(&(0x7f0000000340)={0x1}, 0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 07:57:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x4, 0x0, 0x0) [ 2411.974035] Dev loop4: unable to read RDB block 1 [ 2411.989511] loop4: unable to read partition table [ 2412.007529] loop4: partition table beyond EOD, truncated [ 2412.026821] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:49 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0745520000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x5, 0x0, 0x0) 07:57:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2412.096843] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf210010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xff7e}, 0x1, 0x0, 0x0, 0x8000}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$ax25(r1, &(0x7f0000000140)={{0x3, @netrom}, [@netrom, @remote, @default, @bcast, @rose, @rose, @rose, @null]}, &(0x7f0000000000)=0x48, 0x80000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xa0e60967a120a2b1, 0x0) bind$x25(r4, &(0x7f00000001c0)={0x9, @remote={[], 0x3}}, 0x12) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2412.277684] Dev loop4: unable to read RDB block 1 [ 2412.297595] loop4: unable to read partition table 07:57:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:50 executing program 5: remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x5, 0x8000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4) [ 2412.325956] loop4: partition table beyond EOD, truncated [ 2412.347623] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x500, 0x0, 0x0) [ 2412.454042] Dev loop4: unable to read RDB block 1 07:57:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2412.486636] loop4: unable to read partition table [ 2412.513857] loop4: partition table beyond EOD, truncated [ 2412.523393] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:50 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700600000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) rt_sigtimedwait(&(0x7f0000000680)={0x20}, &(0x7f00000006c0), &(0x7f0000000740)={0x0, 0x989680}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f00000001c0)=0x7, &(0x7f0000000240)=0x4) accept4$packet(r4, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3c) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r10, 0x0, 0x0) syz_open_procfs(r10, &(0x7f0000000100)='net/ip_vs_stats\x00') r11 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$netlink(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, r13, 0xb03, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14}]}, 0x340}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r11, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa020102}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x35c, r13, 0xfb6ac6643e3d65f2, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xeee}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2f, @local, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @broadcast}, 0x10000}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa2}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x722}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffff9f3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x991}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc32b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe0b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x35c}, 0x1, 0x0, 0x0, 0x40010}, 0x8000) 07:57:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000000)=0xa207, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_OVERLAY(r6, 0x4004560e, &(0x7f0000000080)=0x7) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x6b6b6b, 0x0, 0x0) 07:57:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf310010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2412.758994] Dev loop4: unable to read RDB block 1 [ 2412.775297] loop4: unable to read partition table [ 2412.793712] loop4: partition table beyond EOD, truncated 07:57:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2412.822563] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = socket$bt_hidp(0x1f, 0x3, 0x6) fcntl$dupfd(r5, 0x0, r7) accept4$packet(r6, &(0x7f0000000000), 0x0, 0x43966c72c7b807b0) 07:57:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf410010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2412.934413] Dev loop4: unable to read RDB block 1 [ 2412.972275] loop4: unable to read partition table 07:57:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x1000000, 0x0, 0x0) 07:57:50 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x88c8fc0f75fe1a54) r1 = mq_open(&(0x7f0000000080)='posix_acl_access\x00', 0x80, 0x1, &(0x7f00000000c0)={0x8, 0x9, 0x2, 0x8001, 0x1f, 0x406d, 0x4, 0x9}) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000280)={0x10003, 0x1, 0xf000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x4, 0x4) r8 = dup2(r4, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2412.994927] loop4: partition table beyond EOD, truncated [ 2413.010757] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:50 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700680000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0xfffffe13, &(0x7f00000000c0)={0x0, 0x21b}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$unix(r5, &(0x7f0000000180), &(0x7f0000000240)=0x6e, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r7, 0x4010ae67, &(0x7f0000000140)={0x6000, 0x121000}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r6, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_buf(r9, 0x29, 0x14, &(0x7f0000000000)="fab70ee979f4a4076ad5", 0xa) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = fcntl$dupfd(r2, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$packet(0x11, 0x2, 0x300) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$FIONREAD(r14, 0x541b, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r15, 0x0, r16) accept4$packet(r16, &(0x7f0000000380), 0x0, 0xecb63b83539b0158) 07:57:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x4000000, 0x0, 0x0) 07:57:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2413.210573] Dev loop4: unable to read RDB block 1 [ 2413.223680] loop4: unable to read partition table [ 2413.228951] loop4: partition table beyond EOD, truncated [ 2413.266816] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) get_mempolicy(&(0x7f0000000040), 0x0, 0x20200000000000, &(0x7f0000ffd000/0x3000)=nil, 0x4) 07:57:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf510010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2413.384435] Dev loop4: unable to read RDB block 1 [ 2413.390566] loop4: unable to read partition table [ 2413.400643] loop4: partition table beyond EOD, truncated [ 2413.421157] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x5000000, 0x0, 0x0) 07:57:51 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07006c0000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000240)=0xe8) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r6 = dup2(r5, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r11) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r15, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, r4) r17 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r7}, {0x2, 0x7, r9}, {0x2, 0x6, r11}, {0x2, 0x6, r12}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r14}, {0x8, 0x1}, {}, {0x8, 0x2, r16}, {0x8, 0x2, r17}, {0x8, 0x4, r18}], {}, {0x20, 0x4}}, 0x84, 0x2) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r20 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r20, 0x0) write$P9_RWALK(r20, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r21 = dup2(r20, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r24) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r26) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r28, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r29, 0x0) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r30, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r31, r19) r32 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r21, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r22}, {0x2, 0x7, r24}, {0x2, 0x6, r26}, {0x2, 0x6, r27}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r29}, {0x8, 0x1}, {}, {0x8, 0x2, r31}, {0x8, 0x2, r32}, {0x8, 0x4, r33}], {}, {0x20, 0x4}}, 0x84, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) r36 = geteuid() r37 = getuid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r40 = socket$packet(0x11, 0x2, 0x300) r41 = fcntl$dupfd(r39, 0x0, r40) ioctl$PERF_EVENT_IOC_ENABLE(r41, 0x8912, 0x400200) getsockopt$sock_cred(r41, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) r43 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r43, 0x0) write$P9_RWALK(r43, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r44 = dup2(r43, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r44, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r45 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r45, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r46) r47 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r48) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) r49 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r49, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r50, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r53 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r44, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [], {}, [{0x8, 0x1, r50}, {0x8, 0x1, r51}, {0x8, 0x0, r52}, {0x8, 0x2}, {0x8, 0x2, r53}, {0x8, 0x4, r54}], {}, {0x20, 0x4}}, 0x54, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x6b0f91ab2f90933e}, [{0x2, 0x4, r2}, {0x2, 0x5, r3}, {0x2, 0x2, r12}, {0x2, 0x4, r27}, {0x2, 0x5, r34}, {0x2, 0x2, r35}, {0x2, 0x1, r36}, {0x2, 0x6, r37}], {0x4, 0x1}, [{0x8, 0x0, r38}, {0x8, 0x5, r42}, {0x8, 0x1, r53}], {0x10, 0x2}, {0x20, 0x2}}, 0x7c, 0x3) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r55 = socket$inet6_tcp(0xa, 0x1, 0x0) r56 = socket$inet_tcp(0x2, 0x1, 0x0) r57 = fcntl$dupfd(r55, 0x0, r56) ioctl$PERF_EVENT_IOC_ENABLE(r57, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r8 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x800, 0x238000) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r8, &(0x7f0000000140)={0x1}) fcntl$dupfd(r5, 0x0, r6) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000000c0)={r6}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10) 07:57:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x6b6b6b00, 0x0, 0x0) [ 2413.686082] Dev loop4: unable to read RDB block 1 [ 2413.699919] loop4: unable to read partition table 07:57:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf610010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2413.737585] loop4: partition table beyond EOD, truncated [ 2413.758163] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000001300)={{0x1, 0x0, @reserved="12ccc11ebbff20a856b5c864923d0a2a170d8405af96dbc770f0ca12211fc01e"}}) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000080)={0x80000001, 0xfff, 0x7fffffff, 0x35, &(0x7f0000000000)=""/53, 0x8a, &(0x7f0000000140)=""/138, 0x1000, &(0x7f0000000300)=""/4096}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x80000, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r5, 0xc018620c, &(0x7f0000000240)) 07:57:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7) 07:57:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x82ffffff, 0x0, 0x0) [ 2413.892873] Dev loop4: unable to read RDB block 1 [ 2413.911130] loop4: unable to read partition table 07:57:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2413.945896] loop4: partition table beyond EOD, truncated [ 2413.983917] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e22, 0x1, @remote, 0x20}, {0xa, 0x4e23, 0x3ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xc63}, 0x707, [0x3ff, 0x10001, 0x9, 0x6, 0x9c9, 0xca, 0x1, 0x800]}, 0x5c) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:57:51 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700740000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf710010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0xfeffffff, 0x0, 0x0) 07:57:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2414.194711] validate_nla: 8 callbacks suppressed [ 2414.194720] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2414.233649] Dev loop4: unable to read RDB block 1 [ 2414.245927] loop4: unable to read partition table 07:57:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x100, {0x3f, 0x0, 0x40, 0x80, 0x8, 0x7}, 0x9, 0x80}, 0xe) r4 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0xffffffffffffff8f, &(0x7f00000000c0)={0x0, 0x3f1}, 0x1, 0x0, 0x0, 0xc0379d75c721e031}, 0x88b0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) [ 2414.268991] loop4: partition table beyond EOD, truncated [ 2414.311067] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0xffffff82, 0x0, 0x0) 07:57:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf810010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2414.445240] Dev loop4: unable to read RDB block 1 [ 2414.450160] loop4: unable to read partition table [ 2414.476250] loop4: partition table beyond EOD, truncated [ 2414.511725] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f0000000000)=0x7ff, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000080)="f973bc33b4856f37947657354be29f46", 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2414.553771] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='\x00', 0x1, 0x3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000000300)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000140)=""/124, 0x7c}, &(0x7f00000001c0), 0x40}, 0xa0) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) faccessat(r4, &(0x7f0000000240)='./file0\x00', 0x857e754ada193f57, 0xa00) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) fcntl$setown(r7, 0x8, r8) 07:57:52 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07007a0000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0xfffffffe, 0x0, 0x0) [ 2414.680378] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2414.738328] Dev loop4: unable to read RDB block 1 [ 2414.765925] loop4: unable to read partition table 07:57:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xf910010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x1000000000000, 0x0, 0x0) [ 2414.800419] loop4: partition table beyond EOD, truncated [ 2414.856635] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x3cc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r1, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r2, 0x0, r3) r4 = accept4(r3, 0x0, 0x0, 0x40000) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe(&(0x7f0000000080)) r8 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xfffffffffffff000, 0x840) ioctl$PPPIOCSMRU(r8, 0x40047452, &(0x7f0000000000)=0x7fff) accept4$packet(r8, &(0x7f0000000040), 0x0, 0x0) [ 2414.914714] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:52 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r0, 0x0, r1) r2 = dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x40000000015, 0x80005, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r8}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000080)={r8, @in={{0x2, 0x4e22, @empty}}, 0x0, 0x7}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000240)={r9, @in={{0x2, 0x4e20, @multicast1}}, [0x3, 0xfff, 0x7, 0x4, 0x2dd9, 0x8, 0x36, 0x2e42, 0x0, 0x9e5c, 0x1, 0x1, 0x101, 0xfffffffffffffffe, 0xffffffff]}, &(0x7f0000000140)=0x100) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2414.964767] Dev loop4: unable to read RDB block 1 [ 2414.969850] loop4: unable to read partition table [ 2414.996540] loop4: partition table beyond EOD, truncated [ 2415.019099] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x6b6b6b00000000, 0x0, 0x0) 07:57:52 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0704800000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2415.101460] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x100000000000000, 0x0, 0x0) [ 2415.245170] Dev loop4: unable to read RDB block 1 [ 2415.261157] loop4: unable to read partition table [ 2415.281576] loop4: partition table beyond EOD, truncated [ 2415.287345] net_ratelimit: 20 callbacks suppressed 07:57:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfa10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)=[0xffffffff]) [ 2415.287352] protocol 88fb is buggy, dev hsr_slave_0 [ 2415.287427] protocol 88fb is buggy, dev hsr_slave_1 [ 2415.314046] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/235, 0xeb) get_mempolicy(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6) [ 2415.362891] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:53 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="06bf9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730caf15e7154c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a2ab071713b175c46b68db3e813301fd0000000638cae0dc8b02ab2156da58a0a9c8ccb7da70f20f5602aea149007559d25e72b24493f60f586a38f000000005210a4d156e395e16c0f28874f249869694340d1d2eba7ef99fbf557a494ac28e2b08c94b1", @ANYBLOB="e6c55c3df4e86601000000010000009b3d72748d52864e01000000002ee70a67757310554a9ca66864eef1c8c72be40825f38b6c78f0bebc31"], 0x0, 0xe7}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:57:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x400000000000000, 0x0, 0x0) [ 2415.428168] Dev loop4: unable to read RDB block 1 [ 2415.443583] protocol 88fb is buggy, dev hsr_slave_0 [ 2415.448793] protocol 88fb is buggy, dev hsr_slave_1 [ 2415.457014] loop4: unable to read partition table 07:57:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2415.479456] loop4: partition table beyond EOD, truncated [ 2415.496063] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:53 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0701e20000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x500000000000000, 0x0, 0x0) 07:57:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x6, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet_int(r0, 0x0, 0xe, &(0x7f0000000240), &(0x7f0000000000)=0x2) 07:57:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfb10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x41) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2415.739790] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2415.774412] Dev loop4: unable to read RDB block 1 [ 2415.782796] loop4: unable to read partition table [ 2415.799645] loop4: partition table beyond EOD, truncated 07:57:53 executing program 1: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x1, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r2) tkill(r2, 0x16) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:57:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x82ffffff00000000, 0x0, 0x0) [ 2415.830807] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2415.843583] protocol 88fb is buggy, dev hsr_slave_0 [ 2415.843647] protocol 88fb is buggy, dev hsr_slave_1 [ 2415.848762] protocol 88fb is buggy, dev hsr_slave_1 [ 2415.853943] protocol 88fb is buggy, dev hsr_slave_0 [ 2415.864009] protocol 88fb is buggy, dev hsr_slave_1 07:57:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2415.940030] Dev loop4: unable to read RDB block 1 [ 2415.948866] loop4: unable to read partition table [ 2415.979025] loop4: partition table beyond EOD, truncated 07:57:53 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2416.003712] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:53 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700f00000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfc01000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0xfeffffff00000000, 0x0, 0x0) 07:57:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(r0, &(0x7f0000000200), 0x31b, 0x140010006, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x9}, 0xf) [ 2416.186184] Dev loop4: unable to read RDB block 1 [ 2416.206562] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2416.221430] loop4: unable to read partition table [ 2416.245441] loop4: partition table beyond EOD, truncated 07:57:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x72828f70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f0000000240)={0x80000001, 0xff000000, 0xffffffe0, 'queue1\x00', 0x1}) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2416.263762] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x4, 0x0) 07:57:54 executing program 1: io_setup(0x2, &(0x7f00000004c0)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) io_getevents(r0, 0x3, 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000001c0)={0x0, r1+10000000}) [ 2416.371484] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2416.451268] Dev loop4: unable to read RDB block 1 [ 2416.460103] loop4: unable to read partition table [ 2416.474495] loop4: partition table beyond EOD, truncated 07:57:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfc10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x5, 0x0) [ 2416.513378] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070fff0000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCMGET(r4, 0x5415, &(0x7f0000000000)) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2416.601670] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x500, 0x0) [ 2416.725844] Dev loop4: unable to read RDB block 1 [ 2416.743437] loop4: unable to read partition table 07:57:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8}]]}}}]}, 0x38}}, 0x0) 07:57:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfcffffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2416.771525] loop4: partition table beyond EOD, truncated [ 2416.806981] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:54 executing program 1: 07:57:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r4, 0x114, 0xa, &(0x7f0000000000), 0x1) 07:57:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2416.936140] Dev loop4: unable to read RDB block 1 [ 2416.941273] loop4: unable to read partition table [ 2416.971977] loop4: partition table beyond EOD, truncated 07:57:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x6b6b6b, 0x0) 07:57:54 executing program 1: [ 2416.988173] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000200000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:54 executing program 1: 07:57:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:55 executing program 1: 07:57:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfd10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000000)=0x1, 0x4) r4 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x1000000, 0x0) [ 2417.225344] Dev loop4: unable to read RDB block 1 [ 2417.238020] loop4: unable to read partition table [ 2417.263891] loop4: partition table beyond EOD, truncated [ 2417.284891] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:55 executing program 1: 07:57:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2417.363642] protocol 88fb is buggy, dev hsr_slave_0 [ 2417.424502] Dev loop4: unable to read RDB block 1 [ 2417.441415] loop4: unable to read partition table 07:57:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x4000000, 0x0) 07:57:55 executing program 1: [ 2417.464650] loop4: partition table beyond EOD, truncated [ 2417.493660] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:55 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700002000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:55 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x3ba}, 0x7) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000002c0)=""/159, 0x9f, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) read(r3, &(0x7f0000000180)=""/19, 0xfffffe47) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000042}, 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x0) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10034294}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4050000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 07:57:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfe02000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = signalfd4(r0, &(0x7f0000000000)={0x1}, 0x8, 0x1000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f00000000c0)={r2, 0x30}) r3 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x5000000, 0x0) [ 2417.621956] audit: type=1804 audit(1572335875.434:147): pid=13144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir085343823/syzkaller.LC7yTF/3724/bus" dev="sda1" ino=16910 res=1 [ 2417.741599] audit: type=1804 audit(1572335875.434:148): pid=13144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir085343823/syzkaller.LC7yTF/3724/bus" dev="sda1" ino=16910 res=1 07:57:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfe10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2417.796905] Dev loop4: unable to read RDB block 1 [ 2417.801823] loop4: unable to read partition table 07:57:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)) dup3(r0, r1, 0x0) 07:57:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2417.852885] loop4: partition table beyond EOD, truncated [ 2417.859831] audit: type=1804 audit(1572335875.474:149): pid=13144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir085343823/syzkaller.LC7yTF/3724/bus" dev="sda1" ino=16910 res=1 [ 2417.928682] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x6b6b6b00, 0x0) 07:57:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:55 executing program 1: 07:57:55 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff076b6b6b00000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:55 executing program 1: 07:57:55 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xc000, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:56 executing program 1: 07:57:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x82ffffff, 0x0) 07:57:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2418.249493] Dev loop4: unable to read RDB block 1 07:57:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfeff000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2418.276290] loop4: unable to read partition table [ 2418.281383] loop4: partition table beyond EOD, truncated 07:57:56 executing program 1: [ 2418.342828] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0xfeffffff, 0x0) 07:57:56 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) getrandom(&(0x7f0000000000)=""/40, 0x28, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) 07:57:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = dup2(r3, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r9) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r11, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r12, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, r2) r15 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r4, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r5}, {0x2, 0x7, r7}, {0x2, 0x6, r9}, {0x2, 0x6, r10}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r12}, {0x8, 0x1}, {}, {0x8, 0x2, r14}, {0x8, 0x2, r15}, {0x8, 0x4, r16}], {}, {0x20, 0x4}}, 0x84, 0x2) r17 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$chown(0x4, r17, 0x0, 0x0) keyctl$get_persistent(0x16, r7, r17) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x100, 0x0) 07:57:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2418.484423] Dev loop4: unable to read RDB block 1 [ 2418.490601] loop4: unable to read partition table [ 2418.517492] loop4: partition table beyond EOD, truncated [ 2418.568838] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:56 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07fffff000000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0xffffff82, 0x0) 07:57:56 executing program 1: socket$inet6(0xa, 0x2000000080803, 0x4) perf_event_open(0x0, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009de000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') pipe(&(0x7f0000000000)) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r0, r5, 0x0, 0x800000000024) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e20, 0x0, @rand_addr="43eeb3b73dee8ee04f2ebc88cdacb8da"}, {0xa, 0x6, 0x0, @remote}, 0x0, [0x401, 0x1ff, 0x2, 0x7, 0x6, 0xfffffffffffffff9]}, 0x49) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) 07:57:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfeffffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000080)) 07:57:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2418.830273] Dev loop4: unable to read RDB block 1 [ 2418.842253] loop4: unable to read partition table [ 2418.867300] loop4: partition table beyond EOD, truncated 07:57:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0xfffffffe, 0x0) [ 2418.882307] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xff0f000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2419.014745] Dev loop4: unable to read RDB block 1 [ 2419.023606] loop4: unable to read partition table [ 2419.033112] loop4: partition table beyond EOD, truncated [ 2419.055030] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x1000000000000, 0x0) 07:57:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000001000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2419.316350] Dev loop4: unable to read RDB block 1 [ 2419.321583] loop4: unable to read partition table [ 2419.328177] loop4: partition table beyond EOD, truncated [ 2419.340986] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x6b6b6b00000000, 0x0) [ 2419.434141] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2419.451320] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2419.451371] Dev loop4: unable to read RDB block 1 [ 2419.474585] loop4: unable to read partition table [ 2419.491321] loop4: partition table beyond EOD, truncated [ 2419.519399] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2419.554096] validate_nla: 11 callbacks suppressed [ 2419.554106] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:57 executing program 1: r0 = socket(0x11, 0x2, 0x0) close(r0) 07:57:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) 07:57:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000002000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:57 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/233) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f0000001080)=""/246) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000040)) [ 2419.745051] Dev loop4: unable to read RDB block 1 07:57:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2419.768324] loop4: unable to read partition table [ 2419.793105] loop4: partition table beyond EOD, truncated [ 2419.810271] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xff10010000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x100000000000000, 0x0) 07:57:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xc840) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r3 = socket(0x40000000015, 0x80005, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={r5, @in={{0x2, 0x4e20, @multicast1}}, 0xe35, 0x9, 0x200, 0xff, 0x20}, &(0x7f0000000140)=0x98) 07:57:57 executing program 1: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) r1 = socket$inet(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x46, 0x0, &(0x7f0000000300)="7f88c93eec9e501f1622e8da03b0fd7df28534e3ebe8de45c3f668aef48e5a95a9f2bf4e70e5e89f314e450d4963f476b462731f967dcdb8c80da06da429c278696ae1e15827"}) [ 2419.874177] Dev loop4: unable to read RDB block 1 [ 2419.879186] loop4: unable to read partition table [ 2419.896473] loop4: partition table beyond EOD, truncated [ 2419.907238] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000003000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x400000000000000, 0x0) 07:57:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2420.030894] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xff7f000000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2420.144621] Dev loop4: unable to read RDB block 1 [ 2420.163860] loop4: unable to read partition table [ 2420.195982] loop4: partition table beyond EOD, truncated [ 2420.214501] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r0, r1) [ 2420.245816] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) dup2(r2, r0) socketpair$unix(0x1, 0x31b66dd4c7a801e8, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$netrom_NETROM_IDLE(r9, 0x103, 0x7, &(0x7f00000000c0)=0x5, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r10, 0x0, r11) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r11, &(0x7f0000000100)={0x40000004}) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000000000), 0x4) 07:57:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xffff1f0000000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x500000000000000, 0x0) [ 2420.375179] Dev loop4: unable to read RDB block 1 [ 2420.381417] loop4: unable to read partition table [ 2420.411937] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x82ffffff00000000, 0x0) [ 2420.430862] loop4: partition table beyond EOD, truncated [ 2420.466367] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000004000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xffffff7f00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) ptrace$getsig(0x18, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet(r0, &(0x7f00000012c0)=' ', 0x1, 0x0, 0x0, 0x0) 07:57:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r6, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r7, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) fcntl$notify(r8, 0x402, 0x8) r10 = dup2(r0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0xfeffffff00000000, 0x0) [ 2420.690797] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2420.701467] Dev loop4: unable to read RDB block 1 [ 2420.719952] loop4: unable to read partition table [ 2420.766284] loop4: partition table beyond EOD, truncated 07:57:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0xd10c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) [ 2420.810334] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2420.890909] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:57:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2420.975788] Dev loop4: unable to read RDB block 1 [ 2420.980853] loop4: unable to read partition table [ 2420.993796] loop4: partition table beyond EOD, truncated 07:57:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x4) [ 2421.010558] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000005000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) 07:57:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xffffffff00000000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) r3 = socket(0x10, 0x2, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x4) tee(r4, r1, 0x200, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r1, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) setpgid(r5, r6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r2, r7, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) keyctl$setperm(0x5, r2, 0x4020202) 07:57:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:59 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r0, 0x0, 0x0) 07:57:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x5) [ 2421.235065] Dev loop4: unable to read RDB block 1 [ 2421.235995] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2421.258691] loop4: unable to read partition table [ 2421.280361] loop4: partition table beyond EOD, truncated [ 2421.306673] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a746fca63c33cb775870020002bed000000000000c75e00800000000000000000ba78030400cc000000ac01000000003f49590000000000fece8503000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731bed0a1ba19ac3bba971e80a914a341130b760049608baad68cac676f64ae96bf1d5ed36d21e00046ca090000002c3ecaf20080006d98"], 0x1) [ 2421.422233] Dev loop4: unable to read RDB block 1 07:57:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xffffffff87400000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x500) [ 2421.450797] loop4: unable to read partition table [ 2421.462691] loop4: partition table beyond EOD, truncated 07:57:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) mount$9p_virtio(&(0x7f0000000d00)='eth1security\x00', &(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)='9p\x00', 0xd0f054, &(0x7f0000000f80)={'trans=virtio,', {[{@cache_none='cache=none'}, {@noextend='noextend'}], [{@subj_type={'subj_type', 0x3d, 'males\x00\x00\x00\x00\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'map_files\x00'}}, {@subj_type={'subj_type', 0x3d, 'map_files\x00'}}, {@dont_hash='dont_hash'}, {@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, 'map_files\x00'}}, {@pcr={'pcr', 0x3d, 0x26}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f0000000140)={0x5, 0x0, [{}, {}, {}, {}, {}]}) perf_event_open(&(0x7f00000000c0)={0x2, 0x30, 0x9a, 0x6, 0x81, 0x20, 0x0, 0x7, 0x2400, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x410, 0x400, 0x3, 0x4, 0x6, 0x1, 0x7fff}, r2, 0xa, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) eventfd(0xfffffffa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r6, 0x0, r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) fcntl$dupfd(r9, 0x406, r5) r10 = accept4(r1, &(0x7f0000000bc0)=@l2, &(0x7f0000000c40)=0x80, 0xc00) sendto$inet(r10, &(0x7f0000000c80)="521e8af330e2855f04c23f532dd827ecb9f0bb10bfa37becf1b319b7a2d29dffc1f2730b77da75c20265921ff1b8786ba2b69830f7930e2991e9d58c60262dc5c38e185a124180b547c612ac7696af7a4a655a0b1941d2a53b0e18da7c79e09ccb885cb30754baa32e78c143e890", 0x6e, 0x8000, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/2377], 0x949) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f0000000ec0)="137c983ccbf4673e6873cdfc1843d75c27045026bf29912b61dd1c649e5a2102ad6fdf41341ebd14a7298c5b86083cb6cb657cecc8dd6a7f9a20e6aca85b261cf18d025099e23ba1908497c83cbe54bbe7756675cf2d72fdbcdf700508e5e555452169fba2eec5982e78e5f5068eab602d2ea460e5bf0828c04b57a9469f092992ab33a05d0504d35c39f3bebe8b0d65d9b795f0e827d15c3f", 0x99) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2421.523680] net_ratelimit: 17 callbacks suppressed [ 2421.523689] protocol 88fb is buggy, dev hsr_slave_0 [ 2421.528819] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2421.533795] protocol 88fb is buggy, dev hsr_slave_1 07:57:59 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000006000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:57:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0xfffffffffffff000) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x6b6b6b) 07:57:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x9, &(0x7f0000000080)=[{0x3ff, 0xe0, 0xff, 0x81}, {0x81, 0x2, 0x6, 0x5}, {0x5, 0x3, 0x2, 0x8001}, {0x7, 0x48, 0x0, 0x8007}, {0x1f, 0x50, 0x20, 0x4}, {0xfffd, 0x0, 0x3f, 0x20000000}, {0x4, 0x3, 0x6, 0x3ff}, {0x3, 0x9, 0x6, 0x3}, {0xfff, 0x5, 0xff, 0x5}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0x6, 0x30, 0x1, r1}) ioctl$TIOCNXCL(r1, 0x540d) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2421.683580] protocol 88fb is buggy, dev hsr_slave_0 [ 2421.688743] protocol 88fb is buggy, dev hsr_slave_1 07:57:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:57:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r1, 0x0, r2) recvmmsg(r2, &(0x7f0000003600)=[{{&(0x7f0000000140)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/139, 0x8b}, {&(0x7f00000001c0)=""/72, 0x48}], 0x2, &(0x7f0000000400)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000001400)=@nfc, 0x80, &(0x7f0000000380)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1, &(0x7f0000002480)=""/153, 0x99}, 0x6}, {{&(0x7f0000002540)=@nfc, 0x80, &(0x7f00000035c0)=[{&(0x7f00000025c0)=""/4096, 0x1000}], 0x1}, 0x2}], 0x3, 0x1001, &(0x7f00000036c0)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@getstats={0x1c, 0x5e, 0x800, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, 0x7}, ["", ""]}, 0x389}, 0x1, 0x0, 0x0, 0x2404c8c0}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:59 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) 07:57:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x1000000) [ 2421.915215] Dev loop4: unable to read RDB block 1 07:57:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2421.941433] loop4: unable to read partition table [ 2421.953149] loop4: partition table beyond EOD, truncated [ 2421.986353] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:57:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000080)={0xf, @sliced={0x22c, [0x20, 0x0, 0x7, 0x9, 0x8a, 0x3ff, 0x52f, 0xfffd, 0x81, 0x854, 0x8, 0x26, 0x0, 0x2, 0x8, 0x2, 0x2, 0x0, 0x1, 0x1, 0x200, 0x400, 0x4, 0x6, 0xe788, 0x6, 0x4, 0x2, 0x3f, 0x3f, 0x7f, 0x400, 0x7ff, 0x2, 0x6, 0x69, 0x4, 0x8, 0x401, 0x4f, 0x3, 0x363, 0x9, 0x200, 0xcb02, 0x1, 0x9, 0x6], 0xb9}}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:57:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:57:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x4c489330e3b70d87, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x2000000, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x5b6, 'memory'}]}, 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e40f088ca1fffffff0e000000630277fbac14140ce9", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000480)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 2422.083610] protocol 88fb is buggy, dev hsr_slave_0 [ 2422.088825] protocol 88fb is buggy, dev hsr_slave_1 [ 2422.093578] protocol 88fb is buggy, dev hsr_slave_0 [ 2422.094051] protocol 88fb is buggy, dev hsr_slave_0 [ 2422.099155] protocol 88fb is buggy, dev hsr_slave_1 [ 2422.104152] protocol 88fb is buggy, dev hsr_slave_1 07:58:00 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000007000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x4000000) [ 2422.228284] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x5000000) 07:58:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2422.357697] Dev loop4: unable to read RDB block 1 [ 2422.374893] loop4: unable to read partition table 07:58:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, &(0x7f0000000100)=0x1c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0xfffffff8, 0x2, 0x9, 0x7, 0x9}) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:58:00 executing program 1: socket$kcm(0x2b, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 2422.398043] loop4: partition table beyond EOD, truncated [ 2422.435483] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x6b6b6b00) [ 2422.508584] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2422.526465] Dev loop4: unable to read RDB block 1 [ 2422.536237] loop4: unable to read partition table [ 2422.546910] loop4: partition table beyond EOD, truncated [ 2422.561446] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:00 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000008000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x80005, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00 \x00\x00', @ANYBLOB="0cbc21fe04664b4dc8e0a3769ca77ceb0ac216fb720526246a5fb2de102ef8f9a3ad836203fc9a6530113f940b41ad8066f358335b166bbd4ba08e6c679148461ca186c4f5fa5fefb0c18a2a92040888710d4a1d9b4211a9fb183f3fe9b13ca058c8972d6b19ca0f5787f36d4104dbce96dc77089cb3faead8b474a145"], &(0x7f00000000c0)=0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x308}, 0xffffffffffffff57) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x70}, &(0x7f0000000080)=0x8) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:58:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x30, r6, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x9a}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x48c88020}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x78, r6, 0x0, 0x70bd25, 0x0, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="fe60255c8e703947c6279dd4c6939c17"}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x7, 0x1, 0x5a6, 0x317]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x6, 0x4, 0x3, 0x9]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffe01}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r6, 0x509, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9c}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7fffffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x5, 0x5]}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x7, 0x200]}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6120000}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x1080) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x800, 0x3f5) 07:58:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x82ffffff) 07:58:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0), 0x4) sendmsg$kcm(r3, 0x0, 0x0) [ 2422.844801] Dev loop4: unable to read RDB block 1 [ 2422.869453] loop4: unable to read partition table [ 2422.903732] loop4: partition table beyond EOD, truncated [ 2422.909426] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000000)) r1 = dup2(r0, r0) fadvise64(r0, 0x0, 0x9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4) [ 2423.036115] Dev loop4: unable to read RDB block 1 [ 2423.043967] loop4: unable to read partition table [ 2423.059828] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 2423.064497] loop4: partition table beyond EOD, truncated 07:58:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:00 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000040)="9cffffffffffba007a9b80000806256388a8", 0x200001cb}], 0x1}, 0x0) 07:58:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0xfeffffff) [ 2423.097171] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:01 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000009000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0xffffff82) 07:58:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={0x4, 0x880, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "411ccbd26c8034fc66e91f759206bcff5d9ac147b7df54917c8825b486a7b5116eeb0ff819e09a39fdd755220b037b81f86030fce34282025008c560693a896c"}}, 0x80}}, 0x0) [ 2423.294037] Dev loop4: unable to read RDB block 1 [ 2423.300233] loop4: unable to read partition table [ 2423.307141] loop4: partition table beyond EOD, truncated 07:58:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2423.342807] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2423.459020] Dev loop4: unable to read RDB block 1 [ 2423.484696] loop4: unable to read partition table [ 2423.498588] loop4: partition table beyond EOD, truncated [ 2423.520430] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0xfffffffe) 07:58:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x40000000015, 0x80005, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000400)={0x2, 0x0, 0x1820b, 0x8, 0x80, 0x7ff, 0x3ea, 0x7, r6}, &(0x7f0000000080)=0x20) r7 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x282500) ioctl$VIDIOC_G_FMT(r7, 0xc0d05604, &(0x7f0000000300)={0x3, @win={{0x305, 0xd4, 0x9, 0x80000001}, 0x8, 0x7, &(0x7f0000000240)={{0x8, 0xffffff00, 0xffff8000, 0xfffffff7}, &(0x7f0000000180)={{0x6, 0x0, 0xffff0001, 0xa2b}, &(0x7f0000000140)={{0x10000, 0x4, 0xab1, 0x2}}}}, 0x10001, &(0x7f0000000280)="5d801df9aa5ac0f44107261ba50e5737d4d17c8e08ceec877c9001433a9e8fda5c32cdc1ea508bf5908d73cbc108d8b521de96a2c31334c294a23a2e73346f6ae25a3f000edf368d4e4ec0a826c0e194e69934f15b762a7b711e630b60847d9774211645a84c55b2ea139f994a6a6bbe9b", 0x5}}) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x5) 07:58:01 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0741a9e50b000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:01 executing program 1: socket$kcm(0x10, 0x20000000000002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000004c0)={&(0x7f0000000100)=@id, 0x10, &(0x7f0000000400)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 07:58:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_INSTALLED(r2, 0x80024322) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x1800) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, &(0x7f0000000280)=r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000180)={0x3d, 0x8, 0x4, 0xcd}, 0x10) ioctl$EVIOCGPROP(r10, 0x80404509, &(0x7f0000000080)=""/202) 07:58:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2423.793905] Dev loop4: unable to read RDB block 1 [ 2423.799692] loop4: unable to read partition table [ 2423.813651] loop4: partition table beyond EOD, truncated [ 2423.823996] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x1000000000000) 07:58:01 executing program 1: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030304c0019043f3581bf64da30846c9324e98236d2c477451d010bbbc40fe4796697bb46bfdeeabd1054643c7203c442e4d8d4bc43846d3dd7e3d9406613962cb9b2ec2c1da6d4a6dfffa184e0b480b678744bda61d07a73aabd2aa40c4013197e2dbdc10ed3f92afd41507ea43fc7aa31af42967a2d0c2a082816a8d214d21b22e5ef0f"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) [ 2423.919658] Dev loop4: unable to read RDB block 1 [ 2423.925651] loop4: unable to read partition table [ 2423.945766] loop4: partition table beyond EOD, truncated 07:58:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2423.959958] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:01 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000010000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x3, 0x40, 0x9, 0x0, 0x80000000}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={r2, 0x9}, &(0x7f0000000180)=0x8) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:58:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x6b6b6b00000000) 07:58:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) prctl$PR_CAPBSET_READ(0x17, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000040)=ANY=[]) socket$inet_udplite(0x2, 0x2, 0x88) getegid() setresgid(0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) 07:58:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:02 executing program 3: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2424.204367] Dev loop4: unable to read RDB block 1 [ 2424.221206] loop4: unable to read partition table [ 2424.234052] loop4: partition table beyond EOD, truncated [ 2424.239578] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000050700234bf4deb17fe9e42d5806", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010062726964676500000c0002000800070005000000"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x100000000000000) 07:58:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r2, r4, 0x0) r5 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$chown(0x4, r5, 0x0, 0x0) r6 = request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='/dev/fuse\x00', r5) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r6}, &(0x7f0000000180)=""/20, 0x14, 0x0) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) 07:58:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2424.434832] Dev loop4: unable to read RDB block 1 [ 2424.439771] loop4: unable to read partition table [ 2424.473315] loop4: partition table beyond EOD, truncated [ 2424.480711] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fadvise64(r2, 0x49, 0x3f, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = getpgid(0x0) write$FUSE_LK(r8, &(0x7f0000000280)={0x28, 0x0, 0x6db, {{0x6, 0x10001, 0x3, r9}}}, 0x28) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f00000001c0)=r5) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r5, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="b05b2cbd7000fbdbdf251100000008000500030000000800050040000000"], 0x24}, 0x1, 0x0, 0x0, 0x4000890}, 0x4000000) 07:58:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x400000000000000) 07:58:02 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700002611000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_int(r1, 0x6, 0x1, &(0x7f0000000280), &(0x7f0000000100)=0x4) 07:58:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futex(&(0x7f0000000000)=0x1, 0x1, 0x69, &(0x7f00000000c0)={r2, r3+10000000}, &(0x7f0000000100)=0x2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4) [ 2424.682369] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pig=19876 comm=syz-executor.3 [ 2424.769442] Dev loop4: unable to read RDB block 1 [ 2424.775964] loop4: unable to read partition table [ 2424.781874] loop4: partition table beyond EOD, truncated [ 2424.788363] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x500000000000000) 07:58:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)=ANY=[@ANYBLOB="01007c00467a148326e445dcf365bb2766b065a3624ed8562138a1a09526c1c3c35679cf970e306c254c5ce1a06a5900c5b72bcaaba3b72dc5c5764eb75a9a33831c61fb1328ed78141df77a0a887706585dbc3b48405e6d856eeaf52588c089c106ec99518d2259f668faad8aa4d400270a530be78b6d06b345795bc9ef"]) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) munmap(&(0x7f0000626000/0x4000)=nil, 0x4000) 07:58:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2424.892065] Dev loop4: unable to read RDB block 1 [ 2424.904912] loop4: unable to read partition table [ 2424.934414] loop4: partition table beyond EOD, truncated [ 2424.952547] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:02 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000014000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2425.020810] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pig=19876 comm=syz-executor.3 [ 2425.169974] Dev loop4: unable to read RDB block 1 [ 2425.184192] loop4: unable to read partition table [ 2425.196790] loop4: partition table beyond EOD, truncated 07:58:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r1, 0x0, r2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}, 0x182, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)='team_slave_1\x00', 0x80000000, 0x4d48, 0x80}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c00190010000507000007000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010003726964676500000c0002000800070005000000"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x82ffffff00000000) [ 2425.216801] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0xfeffffff00000000) 07:58:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2425.335756] Dev loop4: unable to read RDB block 1 [ 2425.351512] loop4: unable to read partition table [ 2425.370412] loop4: partition table beyond EOD, truncated 07:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r1, 0x0, r2, 0x0, 0x420000a77, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x115}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2425.399920] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:03 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000319000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x104, r1, 0x10, 0x70bd26, 0x5, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff0001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7419}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x29}}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3f}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="066af7236e344aefe83cb5041c8c7a6a"}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffffff7f}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x24008040}, 0x20004055) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r5, 0x0, r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$FICLONE(r6, 0x40049409, r9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000440)={0x9, 0x0, 0x2, 0x2}) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x50, r11, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x02'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xa0800021}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x8c, r11, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x182}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffc00}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x40}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x4}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xa51f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x104484}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r11, 0x324, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x207}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x50}, 0x2400608c) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010062726964676500000c0002000800070005000000"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r7, 0xc0096616, &(0x7f0000000040)={0x1, [0x0]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r8 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x2080) sendmsg$TIPC_NL_MON_GET(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2425.656020] Dev loop4: unable to read RDB block 1 [ 2425.661651] loop4: unable to read partition table 07:58:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) [ 2425.708106] loop4: partition table beyond EOD, truncated 07:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2425.752339] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2425.818489] validate_nla: 7 callbacks suppressed [ 2425.818498] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 07:58:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0xfffffffffffffffa) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffdf5, &(0x7f00000000c0)={0x0}}, 0x400c814) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2425.868370] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2425.882193] IPVS: Scheduler module ip_vs_lblcr not found [ 2425.892978] Dev loop4: unable to read RDB block 1 07:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:03 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) [ 2425.915836] loop4: unable to read partition table [ 2425.929459] loop4: partition table beyond EOD, truncated [ 2425.983626] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:03 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000020000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2426.051788] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 2426.096923] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2426.118533] IPVS: Scheduler module ip_vs_lblcr not found 07:58:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x40000000015, 0x80005, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000000)={r7, 0x1}, &(0x7f0000000040)=0x8) r8 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000140)={{}, [@rose, @netrom, @rose, @netrom, @remote, @netrom, @rose]}, &(0x7f0000000080)=0x48, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r9, 0x0, r10) dup2(r8, r10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) 07:58:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x86, 0x480000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x1dc, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x80}}}}}]}, 0x48}}, 0x0) bind(r2, &(0x7f0000000440)=@hci={0x1f, r1, 0x2}, 0x80) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r6, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r7, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000380)={0x0, @remote, @multicast2}, &(0x7f00000003c0)=0xc) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=@mpls_getnetconf={0x14, 0x52, 0x405, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2426.216238] Dev loop4: unable to read RDB block 1 [ 2426.232247] loop4: unable to read partition table 07:58:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2426.258333] loop4: partition table beyond EOD, truncated [ 2426.288459] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1b9}, 0x1, 0x0, 0x0, 0x8}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:04 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) request_key(0x0, 0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @ioapic={0x0, 0x7ff, 0xfc, 0x3905, 0x0, [{0x3, 0x67, 0x40, [], 0xff}, {0x4, 0x20, 0x2, [], 0x7f}, {0x6, 0x70, 0x1, [], 0x4}, {0x7, 0x3b, 0xff, [], 0x40}, {0x4, 0x77, 0x21, [], 0x29}, {0xc1, 0x80, 0x40, [], 0xf9}, {0x0, 0xff, 0x7f}, {0x7, 0x2, 0x1, [], 0x4}, {0x3, 0x7f, 0xff}, {0x1, 0x7, 0xa9}, {0x8, 0x9, 0x7, [], 0x8}, {0x20, 0x5, 0x0, [], 0x5e}, {0x3, 0x2e, 0x4, [], 0x6}, {0x3, 0x40, 0x0, [], 0x9}, {0x4, 0x8, 0x4, [], 0x3}, {0x0, 0x6, 0xd7, [], 0x3}, {0x9, 0x8, 0x9, [], 0x81}, {0x7, 0x8, 0x8, [], 0xfd}, {0x62, 0x0, 0x20, [], 0x2}, {0x3f, 0xa8, 0x0, [], 0x80}, {0x5, 0x80, 0x6, [], 0x3d}, {0x0, 0x7}, {0x0, 0x0, 0x29, [], 0xa8}, {0x84, 0x1, 0x6, [], 0x7f}]}}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2426.409410] Dev loop4: unable to read RDB block 1 [ 2426.423274] loop4: unable to read partition table [ 2426.445210] loop4: partition table beyond EOD, truncated 07:58:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2426.469263] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:04 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000023000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:04 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x111, 0x5}}, 0x20) r4 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r4, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 07:58:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000080)={0x65e}) [ 2426.692775] Dev loop4: unable to read RDB block 1 07:58:04 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 2426.722131] loop4: unable to read partition table [ 2426.730483] loop4: partition table beyond EOD, truncated [ 2426.753059] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2426.769593] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x6) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r1, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f0000000000)={r0, 0x3d4f524e, 0xffe1, "985c91acc9c73a48d686a444fc113dc3a0f6462bee779047f58cf8b7293e436ba615ce1da4d43a337ad846d0140f59b40012c8faebf2d796b3dc2e65703fe2e22241267ba6af4bffa4eb6a0fc5d2f327f4ce3a92f3e7598537b48a389c15ed9e690213176e0c6fc2261fa51e549f75fc80adcee19f66a7be6697e68e44bf7092eb093d7a39fe8e"}) r6 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r6, 0x0, 0x0, 0x0) 07:58:04 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2426.913829] Dev loop4: unable to read RDB block 1 [ 2426.921261] loop4: unable to read partition table 07:58:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2426.954296] loop4: partition table beyond EOD, truncated [ 2426.954866] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2426.979447] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:04 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000003f000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@ipv4_newrule={0x44, 0x20, 0x200, 0x70bd29, 0x25dffbff, {0x2, 0xb4, 0x20, 0x40, 0x0, 0x0, 0x0, 0x2, 0x1}, [@FRA_GENERIC_POLICY=@FRA_IIFNAME={0x14, 0x3, 'vlan0\x00'}, @FRA_SRC={0x8, 0x2, @local}, @FRA_FLOW={0x8, 0xb, 0x7}]}, 0x44}}, 0x20004018) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000200)=0x14, 0x4) select(0x40, &(0x7f0000000100)={0xb79, 0x200, 0x2, 0x65fa, 0x200, 0xff, 0x3, 0x9}, &(0x7f0000000140)={0x2, 0x9, 0x1, 0x6, 0x6d, 0xfb, 0x4, 0x3}, &(0x7f0000000180)={0xffffffffffffff7f, 0x5e, 0xf2, 0x2, 0x6, 0x0, 0xe0, 0x200}, &(0x7f00000001c0)={0x0, 0x7530}) 07:58:04 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x4, 0x10}, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200004) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) pause() sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:58:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0xfffffe84, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x800) [ 2427.189242] Dev loop4: unable to read RDB block 1 [ 2427.203950] loop4: unable to read partition table [ 2427.225263] loop4: partition table beyond EOD, truncated 07:58:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2427.234380] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:05 executing program 3: r0 = socket(0x40000000015, 0x80005, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={r2, 0x91, "df1d167bf2449a6c74f82fe864d4b24e9a8ef4eaa05530455c230b48828f0e654cff2c815b444225d19437d6ce036488b25a4da439d44da4bdc6d401b3b96b8d2ce3bea6bef6d7acfe23021f337735a79cafed5658e09e0bf4e5e6a709a2f01ab72862f8c8293f4b2e0825740b987b0bce884712cc04d774b7c4646e0b0937cb513951185fec41084b84c7498cbce2603b"}, &(0x7f0000000140)=0x99) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e22, 0xacf3, @mcast2, 0xfff}}, 0x8, 0x2, 0x1000, 0x6c9f, 0x10}, &(0x7f0000000280)=0x98) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000300)={r2, 0xfffffffb}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000380)={r9, 0x0, 0x8, 0x1}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8c0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2427.335946] Dev loop4: unable to read RDB block 1 [ 2427.352653] loop4: unable to read partition table [ 2427.373174] loop4: partition table beyond EOD, truncated 07:58:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2427.408338] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:05 executing program 5: sched_setattr(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000500)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) 07:58:05 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000040000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2427.506661] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2427.630260] Dev loop4: unable to read RDB block 1 [ 2427.644372] loop4: unable to read partition table 07:58:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2427.674042] loop4: partition table beyond EOD, truncated [ 2427.679656] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2427.773671] net_ratelimit: 19 callbacks suppressed [ 2427.773680] protocol 88fb is buggy, dev hsr_slave_0 [ 2427.783843] protocol 88fb is buggy, dev hsr_slave_1 [ 2427.814454] Dev loop4: unable to read RDB block 1 [ 2427.821722] loop4: unable to read partition table [ 2427.827935] loop4: partition table beyond EOD, truncated [ 2427.833628] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2427.923621] protocol 88fb is buggy, dev hsr_slave_0 [ 2427.928875] protocol 88fb is buggy, dev hsr_slave_1 07:58:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r4, 0xc0305710, &(0x7f0000000000)={0x1, 0xc9e1e600, 0x507fce6a, 0x4}) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:06 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070be5a941000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2428.323584] protocol 88fb is buggy, dev hsr_slave_0 [ 2428.323599] protocol 88fb is buggy, dev hsr_slave_0 [ 2428.328831] protocol 88fb is buggy, dev hsr_slave_1 [ 2428.333801] protocol 88fb is buggy, dev hsr_slave_1 [ 2428.338881] protocol 88fb is buggy, dev hsr_slave_0 [ 2428.348926] protocol 88fb is buggy, dev hsr_slave_1 [ 2428.371529] Dev loop4: unable to read RDB block 1 [ 2428.378602] loop4: unable to read partition table [ 2428.389067] loop4: partition table beyond EOD, truncated [ 2428.402093] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:06 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000080)={0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000072c000/0x1000)=nil) r0 = creat(&(0x7f0000001600)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$TIOCSCTTY(r0, 0x540e, 0xffff0000000) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 07:58:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000089b7a37cc16765e40000726964676500000c0002000800070005000000"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xf04e21a97f025e21}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r4, 0x100, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x2, 0x400, 0x4, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x100}, 0x400c155) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x40000000015, 0x80005, 0x0) close(r8) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="ee35714dd686d56ed568751801000000", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r10}, 0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000080)={r10, 0x8}, &(0x7f00000000c0)=0x8) 07:58:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000000)) 07:58:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2428.490517] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 07:58:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) [ 2428.536053] Dev loop4: unable to read RDB block 1 [ 2428.549969] loop4: unable to read partition table [ 2428.564600] loop4: partition table beyond EOD, truncated [ 2428.580571] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) 07:58:06 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000042000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) 07:58:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x401, 0x4, 0x4, 0x2}, {0x101, 0x2, 0x2, 0xa26}, {0x0, 0x1, 0x7, 0x5}, {0x1779, 0x5, 0x5, 0x1}, {0x1, 0x7f, 0x3f, 0x5}]}) accept4$alg(r1, 0x0, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x1, 0x2200) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x100, 0x0) r3 = socket(0x40000000015, 0x80005, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="1b000004b1ab12fc75b71675f9c93c3fa0867368ab35ed8a1739c85575a05157dd424c75c364d34ccb54f2dee4c8f2591e054e8326134b26019460012a6945f6ffa76c377f4f7d97ac0cbd8e37525112d5bf9e1af8368757c43a705d8a66b2bf99f2e84170792860fc0efdb9a2220974bd26e140887785ede719d0cecadec1bbc46d", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r5, @in6={{0xa, 0x4e20, 0x7, @mcast1, 0xe04}}}, 0x84) [ 2428.824715] Dev loop4: unable to read RDB block 1 07:58:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2428.854745] loop4: unable to read partition table [ 2428.860182] loop4: partition table beyond EOD, truncated [ 2428.884822] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2428.984973] Dev loop4: unable to read RDB block 1 [ 2428.990188] loop4: unable to read partition table [ 2428.995593] loop4: partition table beyond EOD, truncated [ 2429.020635] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:06 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) [ 2429.344385] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 07:58:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) sendto$inet6(r1, &(0x7f0000000000)="97c50456b57dec51e0bb7849696b733069f5e2ff38cd4872a3cf251020ca7e2f24624d4ac70684e723a6696250e807ca4042fd64c6875322339157036edfa7037ced75cf6f136e7bddf0362a1949f44e3086406fc4b0b327fa2850312e64a24d972039a62fdb65696ec90e3cdde9db1a4319b14c8cbb5b8a3c7b1c713c2709072eef61ade70886e30a82456e7251be3e2ab58c0f1c705cf93768b73570f359d723f44ef71d122073c02fa732332a9f54863f5add1014fb684254326e702e4f6e", 0xc0, 0x0, &(0x7f0000000140)={0xa, 0x4e24, 0x6, @mcast2, 0xfffffffa}, 0x1c) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:07 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000048000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) dup2(r0, r1) 07:58:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000080)={{0x4000, 0x1000, 0x6, 0x2, 0x3, 0x46, 0x1, 0xff, 0xff, 0x79, 0x1}, {0x9800, 0x1000, 0x1bf329804bae87b4, 0x5, 0x8, 0x7, 0x5, 0x80, 0x5, 0x6, 0x2b, 0xc4}, {0x104001, 0x4, 0x9, 0x0, 0xbe, 0x6, 0xf9, 0x7f, 0x3, 0x6, 0x9, 0x9}, {0x7000, 0x1000, 0xf, 0x1, 0x20, 0x7, 0x2, 0xd0, 0x9, 0x0, 0x20, 0x9}, {0x3000, 0x100000, 0x3, 0x1, 0x9, 0x40, 0x40, 0x2, 0x4, 0x95, 0x8, 0x7}, {0x4000, 0x1000, 0x27, 0x6, 0xa5, 0x8, 0x4, 0x0, 0x4, 0x0, 0x1, 0x7}, {0x100000, 0x6000, 0xe, 0xfa, 0x7, 0x40, 0xff, 0x5, 0x0, 0xb9, 0x0, 0x60}, {0xb071d9aa2abb8a1, 0x1, 0xa, 0xfb, 0x0, 0x7f, 0x3, 0x0, 0x68, 0x81, 0x40, 0x5}, {0x1}, {0xf000, 0x1004}, 0x180000004, 0x0, 0x100000, 0x58004, 0x0, 0x800, 0x0, [0x597b, 0x8, 0x63, 0x8]}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x4100, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x3c, r3, 0xe11, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x20, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'bridge_slave_1\x00'}}}}}, 0x3c}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20004000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x1c, r3, 0xa441661cd2ea62, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x40020) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2429.544664] Dev loop4: unable to read RDB block 1 [ 2429.549962] loop4: unable to read partition table [ 2429.567489] loop4: partition table beyond EOD, truncated [ 2429.575814] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2429.595556] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r2, r4, 0x0) r5 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) r6 = socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) r10 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r9, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r5, r11, 0x0) keyctl$link(0x8, r2, r5) [ 2429.710784] Dev loop4: unable to read RDB block 1 [ 2429.716229] loop4: unable to read partition table [ 2429.732628] loop4: partition table beyond EOD, truncated [ 2429.746193] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2429.762085] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) dup2(r0, r1) 07:58:07 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff075244534b000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.upper\x00', &(0x7f00000003c0)=""/130, 0x82) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x83ee, @local, 0xffff}}, 0x80, 0x7ff}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e22, 0x9, @loopback, 0x100}}, 0xffff}, 0x90) 07:58:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x0, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r0, 0x0, r1) fgetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.origin\x00', &(0x7f00000000c0)=""/122, 0x7a) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) r3 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x87, 0x400) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r5 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) clock_nanosleep(0x7, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000780)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$BLKPBSZGET(r8, 0x127b, &(0x7f0000000a00)) keyctl$chown(0x4, r5, 0x0, 0x0) r9 = request_key(&(0x7f0000000640)='ceph\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='\x00', r5) request_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='udp\x00', r9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$TIPC_NL_BEARER_ENABLE(r12, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000740)={&(0x7f0000000a40)=ANY=[@ANYBLOB="54000000709cd3870770e23290eaea2200958afc63ba638e353bac2bd450d5eff0d5ca1d8fe4096edae3cd1f80b01cc3943b5242f41ff24a7001a2617ba6b5e3c04aeddb441c4646f936e00a4e6922a0e61dc60dc6e3761f004f0ce5d37f4bb2b9a265bed8972088a748df016fbe5ac41ac78b4e24a19268d5a58527a55142eabe21ad84586468c503a0cfcd4cd3ce2a61f9da8477f4a03a1dddc055e496fdc45648125a222e65d24ea1f44db41758c4091c9f5b02be3072", @ANYRES16=0x0, @ANYBLOB="18042dbd7000fedbdf2503000000400005003c000200080001000a00000008000400020000000800030005000000080001000b0000000800040001800000080003002000000008000300ff070000"], 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x96c6f2bce8c0f4bf) r13 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r13, r15, 0x0) keyctl$clear(0x7, r13) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="40020000", @ANYRES16=r4, @ANYBLOB="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"], 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x1) 07:58:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) dup2(r0, r1) [ 2430.017847] Dev loop4: unable to read RDB block 1 [ 2430.022908] loop4: unable to read partition table [ 2430.074594] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2430.080054] loop4: partition table beyond EOD, truncated [ 2430.114131] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:07 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000072c000/0x1000)=nil) open$dir(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000001600)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) 07:58:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x0, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4e9a9c4263d8d715) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2430.134045] Option 'D' to dns_resolver key: bad/missing value 07:58:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2430.228208] Dev loop4: unable to read RDB block 1 [ 2430.239300] loop4: unable to read partition table [ 2430.281964] loop4: partition table beyond EOD, truncated 07:58:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x7) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x100000000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x8925, &(0x7f0000000040)) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r2, 0x0, 0x0, 0x1c1c00) [ 2430.322833] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2430.357686] Option 'D' to dns_resolver key: bad/missing value 07:58:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x0, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:08 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000004c000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@loopback, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2430.550675] sp0: Synchronizing with TNC [ 2430.557426] Dev loop4: unable to read RDB block 1 [ 2430.562365] loop4: unable to read partition table [ 2430.605570] loop4: partition table beyond EOD, truncated [ 2430.627911] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2430.757278] Dev loop4: unable to read RDB block 1 [ 2430.762351] loop4: unable to read partition table [ 2430.779730] loop4: partition table beyond EOD, truncated [ 2430.786082] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2430.935278] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 07:58:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c000000101a058b3a007d006700110000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c00f8030000000000006964676500000c0002000800070005000000"], 0x3c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'ip6erspan0\x00', 0x1000}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200000, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@loopback, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0xffffffffffffffac) r4 = accept4(r0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x6040, 0x0) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r4, 0x0, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) write$selinux_context(0xffffffffffffffff, &(0x7f0000000080)='system_u:object_r:hald_exec_t:s0\x00', 0x21) 07:58:08 executing program 5: 07:58:08 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff074b534452000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:08 executing program 5: 07:58:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2431.124724] Dev loop4: unable to read RDB block 1 [ 2431.129692] loop4: unable to read partition table 07:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@loopback, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:09 executing program 5: [ 2431.210047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6672 sclass=netlink_route_socket pig=24218 comm=syz-executor.3 [ 2431.222013] loop4: partition table beyond EOD, truncated 07:58:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RLERRORu(r4, &(0x7f0000000000)={0x17, 0x7, 0x1, {{0xa, '\\^trusted\''}, 0x3}}, 0x17) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2431.259630] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@loopback, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2431.401530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6672 sclass=netlink_route_socket pig=24218 comm=syz-executor.3 [ 2431.414370] Dev loop4: unable to read RDB block 1 [ 2431.420465] loop4: unable to read partition table [ 2431.464679] loop4: partition table beyond EOD, truncated [ 2431.481197] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:09 executing program 5: 07:58:09 executing program 3: utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x77359400}}) r0 = request_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='\x00', 0xfffffffffffffffb) r1 = add_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$chown(0x4, r2, 0x0, 0x0) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="117cb53fad3cc36d26aa8ab23daafc2c254fcc33ffcbe253d8df64bdb80b2c0125a3541694bf98d470dceb1e0cfb4ce82dd0f0bf02d103917b8158da8c329ad37958068393a3a182f7e12e4ff7f21e463a0ac304fcc6", 0x56, r2) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r3}, &(0x7f0000000400)=""/162, 0xa2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) 07:58:09 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700004552000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@loopback, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r6 = dup2(r5, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r17, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r18, 0x0) r19 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r7}, {0x2, 0x7, r9}, {0x2, 0x6, r11}, {0x2, 0x6, r12}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r14}, {0x8, 0x1, r15}, {0x8, 0x0, r16}, {0x8, 0x2, r18}, {0x8, 0x2, r19}, {0x8, 0x4, r20}], {}, {0x20, 0x4}}, 0x84, 0x2) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000080)="6dacf153515f53eca94a211d80dce2fa412b85c971bcdab4", 0x18, 0xffffffff7fffffff}, {&(0x7f0000000140)="d53c786e13f50fa02a218b554ebb1590bd482889811fd6378342830456750185ccd36a96e5aa8ad93727a4b5aed9f2b7a07c88bf10a73e804eaaa4cb275f97e81252348989fff6daf51d", 0x4a, 0x2}], 0x2c00102, &(0x7f0000000380)={[{@discard_size={'discard', 0x3d, 0x101}}, {@gid={'gid', 0x3d, r4}}, {@integrity='integrity'}, {@errors_remount='errors=remount-ro'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}], [{@uid_eq={'uid', 0x3d, r9}}, {@subj_user={'subj_user', 0x3d, 'cryptd(sha224-generic)\x00'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@subj_type={'subj_type'}}]}) r21 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) accept4$alg(r21, 0x0, 0x0, 0x81800) 07:58:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = accept4(r0, 0x0, 0x0, 0x0) write(r2, &(0x7f0000000000)="c6", 0x1) [ 2431.635543] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2431.725025] Dev loop4: unable to read RDB block 1 [ 2431.729950] loop4: unable to read partition table [ 2431.770798] loop4: partition table beyond EOD, truncated [ 2431.806272] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@loopback, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1b, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2431.945245] Dev loop4: unable to read RDB block 1 [ 2431.957560] loop4: unable to read partition table [ 2431.980129] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.3'. 07:58:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2c00, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000040)={0x0, 0x0, 0x8, {0x8, 0x4}, {0x3f, 0xd5c}, @ramp={0x0, 0x0, {0x1, 0x9, 0x8, 0x6cc}}}) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r3, 0x0, r4) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000080)=0x100) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2432.003074] loop4: partition table beyond EOD, truncated 07:58:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r2, 0x0, 0x0, 0x0) [ 2432.054811] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:09 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0782564557000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2432.168135] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.3'. 07:58:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='\xc4\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:10 executing program 5: [ 2432.245410] Dev loop4: unable to read RDB block 1 [ 2432.250772] loop4: unable to read partition table [ 2432.274473] loop4: partition table beyond EOD, truncated 07:58:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:10 executing program 5: [ 2432.316723] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2432.386839] Dev loop4: unable to read RDB block 1 [ 2432.391814] loop4: unable to read partition table [ 2432.410569] loop4: partition table beyond EOD, truncated [ 2432.430367] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x6, [@multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x804000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x1c8, r5, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffff7f}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller1\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbb2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @local}}}}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff439b9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7a38}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xeb}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x10}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x80000001}, &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCGEFFECTS(r9, 0x80044584, &(0x7f0000000140)=""/102) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000080)={r6, 0x6}, 0x8) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c00000010000507000900000000050300000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010062726964676500000c0002000800070005000100"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f00000000c0)={{0x9, 0x1}, {0x2, 0x4}, 0x1000, 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000080)=0x1, 0x4) 07:58:10 executing program 5: 07:58:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:10 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000060000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:10 executing program 1: [ 2432.593306] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:10 executing program 5: 07:58:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:10 executing program 1: 07:58:10 executing program 5: [ 2432.705284] Dev loop4: unable to read RDB block 1 [ 2432.710842] loop4: unable to read partition table [ 2432.736441] loop4: partition table beyond EOD, truncated 07:58:10 executing program 1: [ 2432.759931] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:10 executing program 5: 07:58:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x80840) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'batadv0\x00', 0x10}) [ 2432.884761] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2432.892621] Dev loop4: unable to read RDB block 1 [ 2432.914890] loop4: unable to read partition table [ 2432.927509] loop4: partition table beyond EOD, truncated [ 2432.936999] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x7) accept$nfc_llcp(r3, &(0x7f0000000000), &(0x7f0000000080)=0x60) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x52aad2a490eb9a98, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000005}, 0x240000b5) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:10 executing program 1: 07:58:10 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000068000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:10 executing program 5: 07:58:10 executing program 1: 07:58:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) recvmmsg(r0, &(0x7f0000003900)=[{{&(0x7f0000000080)=@sco, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/180, 0xb4}, {&(0x7f0000000280)=""/239, 0xef}, {&(0x7f0000000400)=""/147, 0x93}, {&(0x7f00000004c0)=""/232, 0xe8}, {&(0x7f00000005c0)=""/139, 0x8b}], 0x5}, 0x3}, {{&(0x7f0000000680)=@can, 0x80, &(0x7f0000000380)=[{&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/144, 0x90}], 0x2, &(0x7f0000000840)=""/205, 0xcd}, 0x8}, {{&(0x7f0000000940)=@l2, 0x80, &(0x7f0000001f80)=[{&(0x7f00000009c0)=""/223, 0xdf}, {&(0x7f0000000ac0)=""/7, 0x7}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/49, 0x31}, {&(0x7f0000001b40)=""/207, 0xcf}, {&(0x7f0000001c40)=""/231, 0xe7}, {&(0x7f0000001d40)=""/163, 0xa3}, {&(0x7f0000001e00)=""/166, 0xa6}, {&(0x7f0000001ec0)=""/30, 0x1e}, {&(0x7f0000001f00)=""/115, 0x73}], 0xa, &(0x7f0000002040)=""/105, 0x69}, 0x2}, {{&(0x7f00000020c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000002140)=""/151, 0x97}, {&(0x7f0000002200)=""/102, 0x66}, {&(0x7f0000002280)=""/22, 0x16}, {&(0x7f00000022c0)=""/162, 0xa2}, {&(0x7f0000002380)=""/255, 0xff}, {&(0x7f0000002480)=""/57, 0x39}], 0x6}, 0xffff0c91}, {{&(0x7f0000002540)=@l2, 0x80, &(0x7f0000003800)=[{&(0x7f00000025c0)=""/69, 0x45}, {&(0x7f0000002640)=""/219, 0xdb}, {&(0x7f0000002740)=""/76, 0x4c}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/34, 0x22}], 0x5, &(0x7f0000003880)=""/124, 0x7c}, 0x3}], 0x5, 0x40, &(0x7f0000003a40)={0x77359400}) r2 = socket(0x40000000015, 0x80005, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) r5 = socket(0x40000000015, 0x80005, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r7}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000003a80)={r4, 0x3, 0x8001, 0xf4bc, 0x6, 0x40, 0x7a26, 0xffff82fb, {r7, @in={{0x2, 0x4e24, @multicast2}}, 0x5, 0xb09, 0x5, 0x9, 0x7fff}}, &(0x7f0000003b40)=0xb0) 07:58:10 executing program 5: 07:58:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2433.113410] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:11 executing program 1: [ 2433.174938] Dev loop4: unable to read RDB block 1 [ 2433.179869] loop4: unable to read partition table [ 2433.201645] loop4: partition table beyond EOD, truncated 07:58:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x81, 0x200000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000001380)) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r11 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$packet(0x11, 0x2, 0x300) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$bt_sco_SCO_OPTIONS(r14, 0x11, 0x1, &(0x7f0000000040)=""/180, &(0x7f0000000100)=0xb4) accept4$alg(r11, 0x0, 0x0, 0x0) 07:58:11 executing program 5: [ 2433.223106] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:11 executing program 5: 07:58:11 executing program 1: 07:58:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2433.370305] Dev loop4: unable to read RDB block 1 [ 2433.378492] loop4: unable to read partition table [ 2433.389864] loop4: partition table beyond EOD, truncated 07:58:11 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07006b6b6b000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:11 executing program 5: 07:58:11 executing program 1: [ 2433.410845] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2433.568350] Dev loop4: unable to read RDB block 1 [ 2433.573666] loop4: unable to read partition table [ 2433.578806] loop4: partition table beyond EOD, truncated [ 2433.585859] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2433.674866] Dev loop4: unable to read RDB block 1 [ 2433.680085] loop4: unable to read partition table [ 2433.686193] loop4: partition table beyond EOD, truncated [ 2433.691800] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:11 executing program 5: 07:58:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xffffff50}}, 0x8000) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:11 executing program 1: 07:58:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:11 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000006c000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2433.913220] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:11 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000080)={0x30, 0x3, 0x1, 0x1, 0x0, 0x2, 0x4, 0x2}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r4, &(0x7f00000000c0)="a088a53c0851df679e5559c6e368c38768b5cc6068d98787a2fd3dc2390fba0fc2abd8ced04431695f3ce6a7b0bd318b4d291ab166373da1f99efcf852a32f51802512aa79e3e124ab82409e163d163e1a095fd249911d96da851a270b002ed852a3a225d1bd647c8d4e6f971423e1d84e9f42c112c68cd9561d639bbbebb60bdeb8454d7c52cb080e15e7910d0a4c779903d45f94becf2bca6a30f3891022222e7b0c6616423854e358190baff93d593104fa0526fc7ea16c89769574f0df79ebf90aea4bcaec4b9e1497dd09191d0852ec65dbdb31d5773fb1f25893e2ed", 0xdf) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c00f1001000050700000000e939954600000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010062726964676500000c0002000800070005000000"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:11 executing program 1: 07:58:11 executing program 5: [ 2434.003656] net_ratelimit: 19 callbacks suppressed [ 2434.003664] protocol 88fb is buggy, dev hsr_slave_0 [ 2434.013867] protocol 88fb is buggy, dev hsr_slave_1 [ 2434.036927] Dev loop4: unable to read RDB block 1 [ 2434.041947] loop4: unable to read partition table 07:58:11 executing program 3: ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c0001cb6ccf2203c3b16d22fe0062726964676500000c0002000800070005000000"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2434.070797] loop4: partition table beyond EOD, truncated [ 2434.085549] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:12 executing program 1: [ 2434.132603] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2434.163594] protocol 88fb is buggy, dev hsr_slave_0 [ 2434.168810] protocol 88fb is buggy, dev hsr_slave_1 07:58:12 executing program 2: r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r2, 0x0, 0x0, 0x0) 07:58:12 executing program 5: [ 2434.192070] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2434.222433] Dev loop4: unable to read RDB block 1 07:58:12 executing program 3: getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="6f73322e73656c66776c616e3000669cf457347a2104f0b6f172fdb8a5f8fa941469a1164254c7b853bbecf6b35b24ddecf0c3ce686bf3484b164303527258f2ef2a5b361765202646fe8b9f965c7fd953add7a141f5e54261afdf843e0d237ad85f9169a3c5388fcbd2e3051319ab9b5e3eb0c9754e9d4dc1c284a5f860c7d040aa7933560fcf10af45d49fa8a4387e53f02018ba73e403bfaef985d9523a017c06fa21ae04adecd6acc6a3"], &(0x7f0000000180)=""/159, 0x9f) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$tipc(r3, &(0x7f0000000140)=@id={0x1e, 0x3, 0x1, {0x4e22, 0x1}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x4, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x80000001, 0x400000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$IMCTRLREQ(r6, 0x80044945, &(0x7f00000000c0)={0x8, 0x1f, 0x8, 0x80000000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f0000000380)={'ip6erspan0\x00', &(0x7f0000000340)=@ethtool_wolinfo={0x5, 0x6, 0x80000000, "0f4db091e6c3"}}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_G_DV_TIMINGS(r9, 0xc0845658, &(0x7f0000000280)={0x0, @reserved}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2434.243031] loop4: unable to read partition table 07:58:12 executing program 5: 07:58:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2434.303017] loop4: partition table beyond EOD, truncated [ 2434.344245] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:12 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000074000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:12 executing program 1: 07:58:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@null=' \x00', 0xc, 'hwsim0\x00'}) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:12 executing program 5: 07:58:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000008000001c00120b0c00010062726964676500000c0002000800070005000000"], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0x80800) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000140), 0x80, &(0x7f0000001640)=[{&(0x7f0000000280)=""/202, 0xca}, {&(0x7f0000000400)=""/130, 0x82}, {&(0x7f00000001c0)=""/108, 0x6c}, {&(0x7f00000004c0)=""/96, 0x60}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/67, 0x43}, {&(0x7f00000015c0)=""/125, 0x7d}], 0x7, &(0x7f00000016c0)=""/111, 0x6f}, 0x19104) 07:58:12 executing program 1: 07:58:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:12 executing program 5: 07:58:12 executing program 1: [ 2434.563595] protocol 88fb is buggy, dev hsr_slave_0 [ 2434.568809] protocol 88fb is buggy, dev hsr_slave_1 [ 2434.573590] protocol 88fb is buggy, dev hsr_slave_0 [ 2434.574024] protocol 88fb is buggy, dev hsr_slave_0 [ 2434.578944] protocol 88fb is buggy, dev hsr_slave_1 [ 2434.583974] protocol 88fb is buggy, dev hsr_slave_1 [ 2434.612295] Dev loop4: unable to read RDB block 1 [ 2434.638245] loop4: unable to read partition table 07:58:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGPKT(r3, 0x80045438, &(0x7f0000000140)) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40000, 0x0) bind$rose(r4, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, 0x0, [@bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r5, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) 07:58:12 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4302, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r2, 0x0, 0x0, 0x0) 07:58:12 executing program 1: [ 2434.660450] loop4: partition table beyond EOD, truncated [ 2434.733731] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2434.752579] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2434.845275] Dev loop4: unable to read RDB block 1 [ 2434.850234] loop4: unable to read partition table [ 2434.873801] loop4: partition table beyond EOD, truncated [ 2434.879520] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:12 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000007a000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:12 executing program 5: 07:58:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:12 executing program 1: 07:58:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x80) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000140)={{0x3, 0x0, 0x2, 0x1, 0x3}, 0x1, 0x400, 'id1\x00', 'timer0\x00', 0x0, 0x7, 0x96, 0x9, 0x96}) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) 07:58:12 executing program 5: [ 2435.024693] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:12 executing program 1: 07:58:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2435.129471] Dev loop4: unable to read RDB block 1 [ 2435.149162] loop4: unable to read partition table 07:58:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2, 0x48000) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000400)={0x1, @win={{0x6, 0xffff, 0x7}, 0x7, 0x38b6, &(0x7f0000000240)={{0x7, 0x1ff, 0xea2, 0x9}, &(0x7f0000000200)={{0x2, 0x6, 0x4, 0x7}}}, 0xaa, &(0x7f0000000300)="2109d2e07b6e32618c2617e8b67c6daa94300ea49b872a8e4e7891f389818a2b168b8a65e3c63ea0cfae90385f974549707907855484c92e1145b8f33b79d5d807e4ff4b6144fdf914a12f5cad681c4a71caef3a14e4b13625dba14c4f8bd765cfbd14b1f1beaf83cd4f54861a6c8cf34fb84453dc784118e5ccdb51c2175f986ac4756555e585a97797f04af3944b29b265ac64c7548cfbfe682d3a1479845a5579f62cd372849467ff672808ff3bba11060990446aae004e59bc04cbfdbef6596f54d4c0d1acc7c12bb141293062e8d44fe2ce863dabee976a6428af2fde31bc09be25bb2ea7f1a093d13f64d2f3cce1", 0x4}}) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x8000) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/179, 0xb3) [ 2435.184262] loop4: partition table beyond EOD, truncated [ 2435.217878] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:13 executing program 1: 07:58:13 executing program 5: 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2435.369228] Dev loop4: unable to read RDB block 1 [ 2435.380331] loop4: unable to read partition table [ 2435.414453] loop4: partition table beyond EOD, truncated [ 2435.445065] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:13 executing program 1: 07:58:13 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000480000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_mreq(r4, 0x29, 0x15, &(0x7f0000000140)={@remote}, &(0x7f0000000180)=0x14) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:13 executing program 5: 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @multicast1}, &(0x7f00000000c0)=0xc) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROMISCUITY={0x8, 0x1e, 0x8}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00d\x00\a\b\x00'/20, @ANYRES32=r5, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0xb0, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x90, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x84, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @local}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x8001}, @IFLA_VTI_OKEY={0x8, 0x3, 0x3f}, @IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_IKEY={0x8, 0x2, 0x2}, @IFLA_VTI_LINK={0x8, 0x1, r1}, @IFLA_VTI_LINK={0x8, 0x1, r5}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x7}, @IFLA_VTI_OKEY={0x8, 0x3, 0x4}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}, @IFLA_VTI_REMOTE={0x8, 0x5, @multicast1}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x40}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfffffff8}, @IFLA_VTI_IKEY={0x8, 0x2, 0x1000}], @IFLA_VTI_LOCAL={0x8, 0x4, @empty}]}}}]}, 0xb0}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:13 executing program 1: 07:58:13 executing program 5: [ 2435.685312] Dev loop4: unable to read RDB block 1 [ 2435.713661] loop4: unable to read partition table 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:13 executing program 5: 07:58:13 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4002102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) [ 2435.734660] loop4: partition table beyond EOD, truncated [ 2435.767432] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfffffeb5}, 0x1, 0x0, 0x0, 0x10}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2435.888056] Dev loop4: unable to read RDB block 1 [ 2435.906321] loop4: unable to read partition table 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2435.942571] loop4: partition table beyond EOD, truncated [ 2435.983114] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:13 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0757455682000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:13 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8e18) r1 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) fallocate(r1, 0x0, 0xffff, 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_type(r0, &(0x7f0000000040)='\xcb\xce\x99\x00', 0x100000130) fallocate(r0, 0x3, 0x5e89, 0xfff9) 07:58:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x40000000015, 0x80005, 0x0) r5 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x4, 0x60280) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=ANY=[]}, 0x1, 0x0, 0x0, 0x2000c080}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x3}}, 0x806) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3400000064000708000800000000faffffff0000", @ANYRES32, @ANYBLOB="00da00000000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x11, 0x0, 0x1, 0x1, 0x6, @remote}, 0x14) close(r4) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = socket$packet(0x11, 0x2, 0x300) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_INFO(r16, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r13, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = socket$packet(0x11, 0x2, 0x300) r20 = fcntl$dupfd(r18, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r20, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) sendmsg$nl_generic(r8, &(0x7f00000009c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xfef17baf0619d4eb}, 0xc, &(0x7f0000000980)={&(0x7f0000000680)={0x2c8, 0x40, 0x400, 0x70bd29, 0x25dfdbfd, {0xd}, [@typed={0x8, 0x72, @uid=r21}, @generic="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", @generic="594bd9adb795f17e430d85cb9155331379ea726a705b9415121deabdaa0255aa39dbd2a2fcfc1e64df56ecd88869439b0b5875b6c40982f23611baa4", @nested={0x88, 0x7c, [@generic="ad5a54ce349b77cbbdf2e2c71d094f2481d26af3dbb5ffed7e2184e7e667148e82df51971130561c8dc633262a4d94dbe72b5008f073da538c096c2de028b48c12e6e7f17ceba7ae98b341636ec821b0382b99f27086f61c31df437f76721b733df5993c660ab154bfaa6d84a87c14b512e3c2a64519f3881870c713000f6db15569"]}, @generic="3160a713dc02b0ad8caca112bd3ab7b7", @generic="460d58229a4c67906a3ceef0c5927e183f3a245990fb42d549ce4cff41c59a37b3721616e42f5cc3b1bd4a50f2775f51b1470c9101fd1e9ebb6c82cb0b1ae089dbd8d851a7ad10f2bfa4fb2c6aef2a27a9ef2508c83b4a88ac977a76a64b6964042386193593cdfe7ede0b1e3e1dd37223a56f3a0575be3d059161f3dffc9af8117f1239805c643215c630657b5cda612769fc9af307771da482ec412cb646c1226f098b69b4be5d893f4be1949bc3d2b9d1a68c7d75b54e6b855d4407cc0e64a60b58fd9eb0443740887b6872fb0f8d64a5790e92954549"]}, 0x2c8}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r17}, 0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={r17, 0xffce, 0x30, 0x3, 0x10000000000}, &(0x7f00000000c0)=0x18) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="c40000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000a40016008c00010010000200815300001609000002000000100006000100000001007500fbffffff0c000900040000000700000014000b00ffff000000000000090000000000000014000b0001000100000000007f000000000000000c000900bbd4237b0200000014000b000800000000000000020000000000000014000b000400000000000000ff00000000000000100001000c000900090000000300000004000100b817b71df225256c5daf120bb636b24fe5d06aaa8ce9bc39ca2904d805"], 0xc4}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) timer_getoverrun(0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x50, r3, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x02'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xa0800021}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x8c, r3, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x182}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffc00}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x40}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x4}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xa51f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x88, r3, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x43}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x40}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffee9a}]}, 0x88}, 0x1, 0x0, 0x0, 0x8081}, 0xc4) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2436.170205] Dev loop4: unable to read RDB block 1 [ 2436.179487] loop4: unable to read partition table [ 2436.207534] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 07:58:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000080)={0xa991, 0x8, 0x1ff}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2436.212035] loop4: partition table beyond EOD, truncated [ 2436.233121] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2436.284372] IPVS: Scheduler module ip_vs_lblcr not found [ 2436.323319] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300090069000007a2e407edab0080581000000046008107a277001419000a0010000000000003f5000000000200ef38cecb1ed1d7", 0x39}], 0x1) 07:58:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x3, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYBLOB="ffff00000000000000dd"], 0x2) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r6, 0x0, r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) dup2(r6, r8) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x3) [ 2436.384786] Dev loop4: unable to read RDB block 1 [ 2436.399585] loop4: unable to read partition table [ 2436.419659] loop4: partition table beyond EOD, truncated [ 2436.440282] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2436.475813] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 2436.497077] team0: Cannot enslave team device to itself 07:58:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x100, 0x8000) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:14 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)={0x14, 0x100016, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 07:58:14 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07ffffff8c000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:14 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x1, {}, 0x0, 0x2}, 0xe) 07:58:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect={0x2}) ioctl$int_out(r2, 0x2, &(0x7f0000000040)) rename(&(0x7f0000000080)='.\x00', &(0x7f0000000140)='./file0\x00') 07:58:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2436.760831] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2436.839100] Dev loop4: unable to read RDB block 1 [ 2436.853951] loop4: unable to read partition table [ 2436.866271] loop4: partition table beyond EOD, truncated 07:58:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r1, 0x0, r2) splice(0xffffffffffffffff, &(0x7f0000000040), r2, &(0x7f0000000080), 0x100000000, 0xc) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20040014}, 0x400c814) accept4$alg(r3, 0x0, 0x0, 0x0) mlockall(0x1) r4 = socket(0x40000000015, 0x80005, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={r6, 0xfff, 0x3ff, 0x7ff}, 0x10) 07:58:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2436.904436] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x500000000000000, 0x0) 07:58:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2436.999154] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2437.025263] Dev loop4: unable to read RDB block 1 [ 2437.030182] loop4: unable to read partition table 07:58:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:14 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2437.059572] loop4: partition table beyond EOD, truncated [ 2437.072244] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:14 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07ffffdabe000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='ubi1:7'], &(0x7f00000000c0)='./bus\x00', &(0x7f0000000400)='ubifs\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) 07:58:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000240)=0xe8) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r6 = dup2(r5, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r11) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r15, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, r4) r17 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r7}, {0x2, 0x7, r9}, {0x2, 0x6, r11}, {0x2, 0x6, r12}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r14}, {0x8, 0x1}, {}, {0x8, 0x2, r16}, {0x8, 0x2, r17}, {0x8, 0x4, r18}], {}, {0x20, 0x4}}, 0x84, 0x2) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r20 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r20, 0x0) write$P9_RWALK(r20, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r21 = dup2(r20, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r24) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r26) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r28, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r29, 0x0) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r30, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r31, r19) r32 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r21, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r22}, {0x2, 0x7, r24}, {0x2, 0x6, r26}, {0x2, 0x6, r27}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r29}, {0x8, 0x1}, {}, {0x8, 0x2, r31}, {0x8, 0x2, r32}, {0x8, 0x4, r33}], {}, {0x20, 0x4}}, 0x84, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) r36 = geteuid() r37 = getuid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r40 = socket$packet(0x11, 0x2, 0x300) r41 = fcntl$dupfd(r39, 0x0, r40) ioctl$PERF_EVENT_IOC_ENABLE(r41, 0x8912, 0x400200) getsockopt$sock_cred(r41, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) r43 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r43, 0x0) write$P9_RWALK(r43, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r44 = dup2(r43, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r44, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r45 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r45, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r46) r47 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r48) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) r49 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r49, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r50, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r53 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r44, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [], {}, [{0x8, 0x1, r50}, {0x8, 0x1, r51}, {0x8, 0x0, r52}, {0x8, 0x2}, {0x8, 0x2, r53}, {0x8, 0x4, r54}], {}, {0x20, 0x4}}, 0x54, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x6b0f91ab2f90933e}, [{0x2, 0x4, r2}, {0x2, 0x5, r3}, {0x2, 0x2, r12}, {0x2, 0x4, r27}, {0x2, 0x5, r34}, {0x2, 0x2, r35}, {0x2, 0x1, r36}, {0x2, 0x6, r37}], {0x4, 0x1}, [{0x8, 0x0, r38}, {0x8, 0x5, r42}, {0x8, 0x1, r53}], {0x10, 0x2}, {0x20, 0x2}}, 0x7c, 0x3) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r55 = socket$inet6_tcp(0xa, 0x1, 0x0) r56 = socket$inet_tcp(0x2, 0x1, 0x0) r57 = fcntl$dupfd(r55, 0x0, r56) ioctl$PERF_EVENT_IOC_ENABLE(r57, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:58:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2437.264396] Dev loop4: unable to read RDB block 1 [ 2437.270229] loop4: unable to read partition table [ 2437.283909] loop4: partition table beyond EOD, truncated [ 2437.290872] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2437.307875] UBIFS error (pid: 27279): cannot open "ubi1:7", error -19 [ 2437.308271] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2437.410141] UBIFS error (pid: 27283): cannot open "ubi1:7", error -19 [ 2437.410746] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2437.425256] Dev loop4: unable to read RDB block 1 [ 2437.425289] loop4: unable to read partition table [ 2437.457345] loop4: partition table beyond EOD, truncated [ 2437.482219] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07ffffffc9000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:15 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) connect$unix(0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff6e) unshare(0x73bc832d515f4001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100)=0x8, 0x4) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x320, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f0000030028080008000a00e9110000", 0x24}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000080)=0x8f47) 07:58:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000240)=0xe8) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r6 = dup2(r5, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r11) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r15, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, r4) r17 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r7}, {0x2, 0x7, r9}, {0x2, 0x6, r11}, {0x2, 0x6, r12}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r14}, {0x8, 0x1}, {}, {0x8, 0x2, r16}, {0x8, 0x2, r17}, {0x8, 0x4, r18}], {}, {0x20, 0x4}}, 0x84, 0x2) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r20 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r20, 0x0) write$P9_RWALK(r20, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r21 = dup2(r20, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r24) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r26) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r28, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r29, 0x0) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r30, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r31, r19) r32 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r21, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r22}, {0x2, 0x7, r24}, {0x2, 0x6, r26}, {0x2, 0x6, r27}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r29}, {0x8, 0x1}, {}, {0x8, 0x2, r31}, {0x8, 0x2, r32}, {0x8, 0x4, r33}], {}, {0x20, 0x4}}, 0x84, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) r36 = geteuid() r37 = getuid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r40 = socket$packet(0x11, 0x2, 0x300) r41 = fcntl$dupfd(r39, 0x0, r40) ioctl$PERF_EVENT_IOC_ENABLE(r41, 0x8912, 0x400200) getsockopt$sock_cred(r41, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) r43 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r43, 0x0) write$P9_RWALK(r43, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r44 = dup2(r43, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r44, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r45 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r45, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r46) r47 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r48) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) r49 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r49, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r50, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r53 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r44, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [], {}, [{0x8, 0x1, r50}, {0x8, 0x1, r51}, {0x8, 0x0, r52}, {0x8, 0x2}, {0x8, 0x2, r53}, {0x8, 0x4, r54}], {}, {0x20, 0x4}}, 0x54, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x6b0f91ab2f90933e}, [{0x2, 0x4, r2}, {0x2, 0x5, r3}, {0x2, 0x2, r12}, {0x2, 0x4, r27}, {0x2, 0x5, r34}, {0x2, 0x2, r35}, {0x2, 0x1, r36}, {0x2, 0x6, r37}], {0x4, 0x1}, [{0x8, 0x0, r38}, {0x8, 0x5, r42}, {0x8, 0x1, r53}], {0x10, 0x2}, {0x20, 0x2}}, 0x7c, 0x3) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r55 = socket$inet6_tcp(0xa, 0x1, 0x0) r56 = socket$inet_tcp(0x2, 0x1, 0x0) r57 = fcntl$dupfd(r55, 0x0, r56) ioctl$PERF_EVENT_IOC_ENABLE(r57, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:58:15 executing program 2: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000180)=0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r3, 0x0, r4) r5 = accept4(r4, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x3, 0x0, 0x8, 0xfbc, 0x0, 0x6, 0xff, 0x39, 0x38, 0x15c, 0x2ea8d25e, 0x3f, 0x20, 0x2, 0x4, 0x1, 0x1ea8}, [{0x6, 0x5, 0x200, 0x9, 0xfffffe00, 0x2, 0x307b, 0x3}], "7dbe81aeff78c8edbd53a1dc", [[], [], [], [], []]}, 0x564) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r6 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7a74, 0x8000) r7 = socket(0x40000000015, 0x80005, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000001c0)={r9, 0x7ff}, &(0x7f0000000240)=0x8) write$FUSE_INIT(r6, &(0x7f0000000040)={0x50, 0x0, 0x6, {0x7, 0x1f, 0x3, 0x404, 0x7f, 0x0, 0x6, 0xffffffff}}, 0x50) accept4$alg(r5, 0x0, 0x0, 0x0) 07:58:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000300)="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", 0x1000) r4 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r4, 0x0, 0x0, 0x0) [ 2437.980995] Dev loop4: unable to read RDB block 1 [ 2437.986896] loop4: unable to read partition table [ 2437.998832] loop4: partition table beyond EOD, truncated [ 2438.014071] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2438.053238] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 2438.126256] Dev loop4: unable to read RDB block 1 07:58:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2438.149639] loop4: unable to read partition table [ 2438.157900] loop4: partition table beyond EOD, truncated [ 2438.175393] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000240)=0xe8) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r6 = dup2(r5, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r11) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r14, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r15, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r16, r4) r17 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r7}, {0x2, 0x7, r9}, {0x2, 0x6, r11}, {0x2, 0x6, r12}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r14}, {0x8, 0x1}, {}, {0x8, 0x2, r16}, {0x8, 0x2, r17}, {0x8, 0x4, r18}], {}, {0x20, 0x4}}, 0x84, 0x2) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r20 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r20, 0x0) write$P9_RWALK(r20, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r21 = dup2(r20, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r23 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r24) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r26) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r28, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r29, 0x0) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r30, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r31, r19) r32 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r21, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r22}, {0x2, 0x7, r24}, {0x2, 0x6, r26}, {0x2, 0x6, r27}, {0x2, 0x2, 0xee00}, {0x2, 0x4, 0xee01}], {}, [{0x8, 0x7, r29}, {0x8, 0x1}, {}, {0x8, 0x2, r31}, {0x8, 0x2, r32}, {0x8, 0x4, r33}], {}, {0x20, 0x4}}, 0x84, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) r36 = geteuid() r37 = getuid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r40 = socket$packet(0x11, 0x2, 0x300) r41 = fcntl$dupfd(r39, 0x0, r40) ioctl$PERF_EVENT_IOC_ENABLE(r41, 0x8912, 0x400200) getsockopt$sock_cred(r41, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) r43 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r43, 0x0) write$P9_RWALK(r43, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r44 = dup2(r43, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r44, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r45 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r45, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r46) r47 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r48) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) r49 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r49, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r50, 0x0) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00]) r53 = getgid() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r44, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [], {}, [{0x8, 0x1, r50}, {0x8, 0x1, r51}, {0x8, 0x0, r52}, {0x8, 0x2}, {0x8, 0x2, r53}, {0x8, 0x4, r54}], {}, {0x20, 0x4}}, 0x54, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x6b0f91ab2f90933e}, [{0x2, 0x4, r2}, {0x2, 0x5, r3}, {0x2, 0x2, r12}, {0x2, 0x4, r27}, {0x2, 0x5, r34}, {0x2, 0x2, r35}, {0x2, 0x1, r36}, {0x2, 0x6, r37}], {0x4, 0x1}, [{0x8, 0x0, r38}, {0x8, 0x5, r42}, {0x8, 0x1, r53}], {0x10, 0x2}, {0x20, 0x2}}, 0x7c, 0x3) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r55 = socket$inet6_tcp(0xa, 0x1, 0x0) r56 = socket$inet_tcp(0x2, 0x1, 0x0) r57 = fcntl$dupfd(r55, 0x0, r56) ioctl$PERF_EVENT_IOC_ENABLE(r57, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000040), 0x0, 0x0) 07:58:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000001e2000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="b1aaaaaaaaaa000000faffbecab6bf0000040000000000000000002c00009078ac14959414bbac1414bb02e000000200000c00"/62, @ANYRES32=0x41424344, @ANYRES32=0x42424242, @ANYBLOB="5000000090780000"], 0x0) [ 2438.229671] netlink: 'syz-executor.3': attribute type 7 has an invalid length. 07:58:16 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, r3, 0xb03, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14}]}, 0x340}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20100020}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x84, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'dummy0\x00'}}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf316}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x80000}, 0x54) 07:58:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2438.376265] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2438.412130] Dev loop4: unable to read RDB block 1 07:58:16 executing program 3: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x25dfdbfc}, 0x20}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) [ 2438.428371] loop4: unable to read partition table [ 2438.452015] loop4: partition table beyond EOD, truncated [ 2438.472467] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080)={r4, 0x9}, 0x8) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r5, 0x0, 0x0, 0x0) 07:58:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) connect$unix(0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff6e) unshare(0x73bc832d515f4001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100)=0x8, 0x4) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x320, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f0000030028080008000a00e9110000", 0x24}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000080)=0x8f47) 07:58:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2438.595650] Dev loop4: unable to read RDB block 1 [ 2438.608639] loop4: unable to read partition table [ 2438.629001] loop4: partition table beyond EOD, truncated [ 2438.638688] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@empty, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x4, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xa}, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x4e21, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07ffffffee000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(tea-generic)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) connect$unix(0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff6e) unshare(0x73bc832d515f4001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100)=0x8, 0x4) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x320, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f0000030028080008000a00e9110000", 0x24}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000080)=0x8f47) [ 2438.866511] Dev loop4: unable to read RDB block 1 [ 2438.901646] loop4: unable to read partition table [ 2438.923922] loop4: partition table beyond EOD, truncated [ 2438.937409] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-arm64-ce\x00'}, 0x58) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:klogd_var_run_\xf4:s0\x00\xa4D\xf8\xeaC\xcd\x00}Wxwx{\xd9\xf7\xdd;\xa3\v\xea\x95\x9e\a\xbd\x88\xb1NQ\xac\xb1\x89\xf0\a\xb5\xecg\x8e*\'p\a\xa2N@\xc0\xd8\xfd\x85~', 0x56, 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r8, 0x0, r9) ioctl$PPPIOCATTACH(r7, 0x4004743d, &(0x7f00000003c0)=0x2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, &(0x7f0000000380)={{0x2, 0x0, @identifier="1ec4f3b34651a5a410452b09121ae143"}}) ioctl$IMGETDEVINFO(r7, 0x80044944, &(0x7f0000000140)={0x3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x84, 0xff, 0x25, 0x5e, 0x0, 0x9, 0x80880, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x7, @perf_bp={&(0x7f0000000000), 0x7b973a26614a8c9c}, 0x4, 0x100000001, 0x10000, 0x1, 0x9, 0x7f}, 0xffffffffffffffff, 0x1, r4, 0x1) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f0000000480)={0x8029, 0x1}) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x800) [ 2439.086512] Dev loop4: unable to read RDB block 1 [ 2439.091585] loop4: unable to read partition table [ 2439.143796] loop4: partition table beyond EOD, truncated [ 2439.159415] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:17 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07fffffff4000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2439.537320] Dev loop4: unable to read RDB block 1 [ 2439.542246] loop4: unable to read partition table [ 2439.568527] loop4: partition table beyond EOD, truncated [ 2439.597172] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2439.744310] Dev loop4: unable to read RDB block 1 [ 2439.749997] loop4: unable to read partition table [ 2439.761009] loop4: partition table beyond EOD, truncated [ 2439.822882] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x383, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c000000105a344c16214a8e16567e85128a0000", @ANYRES32=0x0, @ANYRESHEX], 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) 07:58:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x4) bind(r2, &(0x7f0000000000)=@ipx={0x4, 0x800, 0xffff, "a7cb60154e64", 0x9}, 0x80) accept4$alg(r1, 0x0, 0x0, 0x0) 07:58:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344, 0x41424344}, 0x25, 0x7) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, r2, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:17 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07fffffff5000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) [ 2440.106780] Dev loop4: unable to read RDB block 1 [ 2440.112038] loop4: unable to read partition table [ 2440.127659] loop4: partition table beyond EOD, truncated [ 2440.153145] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000000)=0x6, 0x4) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r4, 0x0, 0x0, 0x0) 07:58:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x10, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@rr={0x7, 0xfffffe8f, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tipc=@payload_named={{{{{0xffffffffffffffd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x4, 0x0, 0x0, 0x8, 0x5, 0x2, 0xaa, 0x6, 0x4, 0x4e20, 0x4e24}}, 0x4, 0x4}}, [0x0, 0x0, 0x0, 0x0]}}}}}, 0x0) [ 2440.243618] net_ratelimit: 20 callbacks suppressed [ 2440.243628] protocol 88fb is buggy, dev hsr_slave_0 [ 2440.254700] protocol 88fb is buggy, dev hsr_slave_1 [ 2440.294766] Dev loop4: unable to read RDB block 1 [ 2440.300447] loop4: unable to read partition table [ 2440.330861] loop4: partition table beyond EOD, truncated [ 2440.365131] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2440.403618] protocol 88fb is buggy, dev hsr_slave_0 [ 2440.408771] protocol 88fb is buggy, dev hsr_slave_1 [ 2440.804403] protocol 88fb is buggy, dev hsr_slave_0 [ 2440.812953] protocol 88fb is buggy, dev hsr_slave_1 [ 2440.813546] protocol 88fb is buggy, dev hsr_slave_0 [ 2440.823073] protocol 88fb is buggy, dev hsr_slave_1 [ 2440.828209] protocol 88fb is buggy, dev hsr_slave_0 [ 2440.833320] protocol 88fb is buggy, dev hsr_slave_1 07:58:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) connect$unix(0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff6e) unshare(0x73bc832d515f4001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100)=0x8, 0x4) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x320, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f0000030028080008000a00e9110000", 0x24}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x5}]}}}]}, 0x3c}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000080)=0x8f47) 07:58:20 executing program 3: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x800, 0x4) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x44a100, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000000c0)) 07:58:20 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07fffffff6000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket(0x40000000015, 0x80005, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000000)={r4, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, [0x101, 0x8, 0x7, 0xfffffffffffffffe, 0x6, 0x80000000, 0xfffffffffffffff7, 0x7fffffff, 0xf2, 0x0, 0x8, 0x8b72, 0x7ff, 0x0, 0x1]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e21, 0x5, @mcast1}}}, &(0x7f0000000280)=0x84) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:58:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000300)=""/232) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_open_pts(r7, 0x4000) [ 2442.426197] Dev loop4: unable to read RDB block 1 [ 2442.431132] loop4: unable to read partition table 07:58:20 executing program 1 (fault-call:1 fault-nth:0): r0 = socket(0x40000000015, 0x80005, 0x0) close(r0) 07:58:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) [ 2442.474072] loop4: partition table beyond EOD, truncated [ 2442.482519] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0xf6, &(0x7f00000000c0)={0x0, 0xbc479fa59038806}, 0x1, 0x0, 0x0, 0x4801}, 0x400e804) accept4$alg(r1, 0x0, 0x0, 0x0) [ 2442.566247] Dev loop4: unable to read RDB block 1 [ 2442.582213] loop4: unable to read partition table [ 2442.601531] loop4: partition table beyond EOD, truncated [ 2442.613830] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 07:58:20 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07fffffffb000000000000000000000000000000000000420000000000000000000100000000000000000000000000000055aa", 0x3e, 0x1c2}]) 07:58:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x101, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 07:58:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c814) accept4$alg(r1, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x9) ioctl$USBDEVFS_RESET(r2, 0x5514) 07:58:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x6, [@loopback, @multicast2, @multicast2]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 2442.859133] Dev loop4: unable to read RDB block 1 [ 2442.890176] loop4: unable to read partition table [ 2442.919005] loop4: partition table beyond EOD, truncated [ 2442.943457] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2443.080314] Dev loop4: unable to read RDB block 1 [ 2443.112353] loop4: unable to read partition table [ 2443.147078] loop4: partition table beyond EOD, truncated [ 2443.166276] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2445.437620] audit: type=1400 audit(1572335903.254:150): avc: denied { map } for pid=29652 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14970 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_passwd_agent_exec_t:s0 tclass=file permissive=1 [ 2446.493589] net_ratelimit: 19 callbacks suppressed [ 2446.493601] protocol 88fb is buggy, dev hsr_slave_0 [ 2446.503766] protocol 88fb is buggy, dev hsr_slave_1 [ 2446.643589] protocol 88fb is buggy, dev hsr_slave_0 [ 2446.648714] protocol 88fb is buggy, dev hsr_slave_1 [ 2447.043589] protocol 88fb is buggy, dev hsr_slave_0 [ 2447.043680] protocol 88fb is buggy, dev hsr_slave_1 [ 2447.048707] protocol 88fb is buggy, dev hsr_slave_1 [ 2447.053780] protocol 88fb is buggy, dev hsr_slave_0 [ 2447.063859] protocol 88fb is buggy, dev hsr_slave_1 [ 2447.410370] device bridge_slave_1 left promiscuous mode [ 2447.416565] bridge0: port 2(bridge_slave_1) entered disabled state [ 2447.496110] device bridge_slave_0 left promiscuous mode [ 2447.501655] bridge0: port 1(bridge_slave_0) entered disabled state [ 2448.563733] protocol 88fb is buggy, dev hsr_slave_0 [ 2452.733730] net_ratelimit: 15 callbacks suppressed [ 2452.733740] protocol 88fb is buggy, dev hsr_slave_0 [ 2452.744350] protocol 88fb is buggy, dev hsr_slave_1 [ 2452.883650] protocol 88fb is buggy, dev hsr_slave_0 [ 2452.888748] protocol 88fb is buggy, dev hsr_slave_1 [ 2453.283625] protocol 88fb is buggy, dev hsr_slave_0 [ 2453.283632] protocol 88fb is buggy, dev hsr_slave_0 [ 2453.283732] protocol 88fb is buggy, dev hsr_slave_1 [ 2453.288771] protocol 88fb is buggy, dev hsr_slave_1 [ 2454.803691] protocol 88fb is buggy, dev hsr_slave_0 [ 2454.808826] protocol 88fb is buggy, dev hsr_slave_1 [ 2458.963652] net_ratelimit: 14 callbacks suppressed [ 2458.963659] protocol 88fb is buggy, dev hsr_slave_0 [ 2458.973763] protocol 88fb is buggy, dev hsr_slave_1 [ 2459.133625] protocol 88fb is buggy, dev hsr_slave_0 [ 2459.138890] protocol 88fb is buggy, dev hsr_slave_1 [ 2459.523641] protocol 88fb is buggy, dev hsr_slave_0 [ 2459.523669] protocol 88fb is buggy, dev hsr_slave_0 [ 2459.523759] protocol 88fb is buggy, dev hsr_slave_1 [ 2459.528887] protocol 88fb is buggy, dev hsr_slave_1 [ 2461.043697] protocol 88fb is buggy, dev hsr_slave_0 [ 2461.048857] protocol 88fb is buggy, dev hsr_slave_1 [ 2465.203700] net_ratelimit: 14 callbacks suppressed [ 2465.203706] protocol 88fb is buggy, dev hsr_slave_0 [ 2465.213899] protocol 88fb is buggy, dev hsr_slave_1 [ 2465.363720] protocol 88fb is buggy, dev hsr_slave_0 [ 2465.368963] protocol 88fb is buggy, dev hsr_slave_1 [ 2465.763642] protocol 88fb is buggy, dev hsr_slave_0 [ 2465.763678] protocol 88fb is buggy, dev hsr_slave_0 [ 2465.768837] protocol 88fb is buggy, dev hsr_slave_1 [ 2465.773843] protocol 88fb is buggy, dev hsr_slave_1 [ 2467.285585] protocol 88fb is buggy, dev hsr_slave_0 [ 2467.290952] protocol 88fb is buggy, dev hsr_slave_1 [ 2471.453717] net_ratelimit: 14 callbacks suppressed [ 2471.453731] protocol 88fb is buggy, dev hsr_slave_0 [ 2471.464239] protocol 88fb is buggy, dev hsr_slave_1 [ 2471.603722] protocol 88fb is buggy, dev hsr_slave_0 [ 2471.610290] protocol 88fb is buggy, dev hsr_slave_1 [ 2472.003683] protocol 88fb is buggy, dev hsr_slave_0 [ 2472.003688] protocol 88fb is buggy, dev hsr_slave_0 [ 2472.003791] protocol 88fb is buggy, dev hsr_slave_1 [ 2472.009201] protocol 88fb is buggy, dev hsr_slave_1 [ 2473.523717] protocol 88fb is buggy, dev hsr_slave_0 [ 2473.528880] protocol 88fb is buggy, dev hsr_slave_1 [ 2477.683701] net_ratelimit: 14 callbacks suppressed [ 2477.688725] protocol 88fb is buggy, dev hsr_slave_0 [ 2477.693845] protocol 88fb is buggy, dev hsr_slave_1 [ 2477.843625] protocol 88fb is buggy, dev hsr_slave_0 [ 2477.848939] protocol 88fb is buggy, dev hsr_slave_1 [ 2478.243661] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.243666] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.243785] protocol 88fb is buggy, dev hsr_slave_1 [ 2478.248800] protocol 88fb is buggy, dev hsr_slave_1 [ 2479.773644] protocol 88fb is buggy, dev hsr_slave_0 [ 2479.778763] protocol 88fb is buggy, dev hsr_slave_1 [ 2483.923702] net_ratelimit: 13 callbacks suppressed [ 2483.923710] protocol 88fb is buggy, dev hsr_slave_0 [ 2483.933996] protocol 88fb is buggy, dev hsr_slave_1 [ 2484.083655] protocol 88fb is buggy, dev hsr_slave_0 [ 2484.088770] protocol 88fb is buggy, dev hsr_slave_1 [ 2484.483655] protocol 88fb is buggy, dev hsr_slave_0 [ 2484.483659] protocol 88fb is buggy, dev hsr_slave_0 [ 2484.483764] protocol 88fb is buggy, dev hsr_slave_1 [ 2484.488955] protocol 88fb is buggy, dev hsr_slave_1 [ 2486.003711] protocol 88fb is buggy, dev hsr_slave_0 [ 2486.008912] protocol 88fb is buggy, dev hsr_slave_1 [ 2490.163739] net_ratelimit: 14 callbacks suppressed [ 2490.163749] protocol 88fb is buggy, dev hsr_slave_0 [ 2490.173958] protocol 88fb is buggy, dev hsr_slave_1 [ 2490.333621] protocol 88fb is buggy, dev hsr_slave_0 [ 2490.338745] protocol 88fb is buggy, dev hsr_slave_1 [ 2490.723661] protocol 88fb is buggy, dev hsr_slave_0 [ 2490.728786] protocol 88fb is buggy, dev hsr_slave_1 [ 2490.733622] protocol 88fb is buggy, dev hsr_slave_0 [ 2490.738903] protocol 88fb is buggy, dev hsr_slave_1 [ 2492.243673] protocol 88fb is buggy, dev hsr_slave_0 [ 2492.248784] protocol 88fb is buggy, dev hsr_slave_1 [ 2496.403658] net_ratelimit: 14 callbacks suppressed [ 2496.403664] protocol 88fb is buggy, dev hsr_slave_0 [ 2496.413754] protocol 88fb is buggy, dev hsr_slave_1 [ 2496.563616] protocol 88fb is buggy, dev hsr_slave_0 [ 2496.568700] protocol 88fb is buggy, dev hsr_slave_1 [ 2496.963663] protocol 88fb is buggy, dev hsr_slave_0 [ 2496.968811] protocol 88fb is buggy, dev hsr_slave_1 [ 2496.973585] protocol 88fb is buggy, dev hsr_slave_0 [ 2496.978989] protocol 88fb is buggy, dev hsr_slave_1 [ 2498.483672] protocol 88fb is buggy, dev hsr_slave_0 [ 2498.488835] protocol 88fb is buggy, dev hsr_slave_1 [ 2502.643720] net_ratelimit: 14 callbacks suppressed [ 2502.643728] protocol 88fb is buggy, dev hsr_slave_0 [ 2502.648781] protocol 88fb is buggy, dev hsr_slave_1 [ 2502.803633] protocol 88fb is buggy, dev hsr_slave_0 [ 2502.808772] protocol 88fb is buggy, dev hsr_slave_1 [ 2503.203630] protocol 88fb is buggy, dev hsr_slave_0 [ 2503.208782] protocol 88fb is buggy, dev hsr_slave_1 [ 2503.213676] protocol 88fb is buggy, dev hsr_slave_0 [ 2503.218887] protocol 88fb is buggy, dev hsr_slave_1 [ 2504.723700] protocol 88fb is buggy, dev hsr_slave_0 [ 2504.728875] protocol 88fb is buggy, dev hsr_slave_1 [ 2508.883645] net_ratelimit: 14 callbacks suppressed [ 2508.883653] protocol 88fb is buggy, dev hsr_slave_0 [ 2508.893762] protocol 88fb is buggy, dev hsr_slave_1 [ 2509.043612] protocol 88fb is buggy, dev hsr_slave_0 [ 2509.048728] protocol 88fb is buggy, dev hsr_slave_1 [ 2509.443622] protocol 88fb is buggy, dev hsr_slave_0 [ 2509.448917] protocol 88fb is buggy, dev hsr_slave_1 [ 2509.453681] protocol 88fb is buggy, dev hsr_slave_0 [ 2509.459244] protocol 88fb is buggy, dev hsr_slave_1 [ 2510.963728] protocol 88fb is buggy, dev hsr_slave_0 [ 2510.968859] protocol 88fb is buggy, dev hsr_slave_1 [ 2515.123681] net_ratelimit: 13 callbacks suppressed [ 2515.123687] protocol 88fb is buggy, dev hsr_slave_0 [ 2515.134133] protocol 88fb is buggy, dev hsr_slave_1 [ 2515.293635] protocol 88fb is buggy, dev hsr_slave_0 [ 2515.298821] protocol 88fb is buggy, dev hsr_slave_1 [ 2515.683636] protocol 88fb is buggy, dev hsr_slave_0 [ 2515.683652] protocol 88fb is buggy, dev hsr_slave_0 [ 2515.688809] protocol 88fb is buggy, dev hsr_slave_1 [ 2515.693845] protocol 88fb is buggy, dev hsr_slave_1 [ 2517.203684] protocol 88fb is buggy, dev hsr_slave_0 [ 2517.208835] protocol 88fb is buggy, dev hsr_slave_1 [ 2521.363696] net_ratelimit: 14 callbacks suppressed [ 2521.363706] protocol 88fb is buggy, dev hsr_slave_0 [ 2521.373968] protocol 88fb is buggy, dev hsr_slave_1 [ 2521.523612] protocol 88fb is buggy, dev hsr_slave_0 [ 2521.528708] protocol 88fb is buggy, dev hsr_slave_1 [ 2521.923630] protocol 88fb is buggy, dev hsr_slave_0 [ 2521.928858] protocol 88fb is buggy, dev hsr_slave_1 [ 2521.933596] protocol 88fb is buggy, dev hsr_slave_0 [ 2521.939115] protocol 88fb is buggy, dev hsr_slave_1 [ 2523.443736] protocol 88fb is buggy, dev hsr_slave_0 [ 2523.448970] protocol 88fb is buggy, dev hsr_slave_1 [ 2527.603732] net_ratelimit: 14 callbacks suppressed [ 2527.603741] protocol 88fb is buggy, dev hsr_slave_0 [ 2527.613826] protocol 88fb is buggy, dev hsr_slave_1 [ 2527.763624] protocol 88fb is buggy, dev hsr_slave_0 [ 2527.768838] protocol 88fb is buggy, dev hsr_slave_1 [ 2528.163639] protocol 88fb is buggy, dev hsr_slave_0 [ 2528.163655] protocol 88fb is buggy, dev hsr_slave_0 [ 2528.168815] protocol 88fb is buggy, dev hsr_slave_1 [ 2528.173829] protocol 88fb is buggy, dev hsr_slave_1 [ 2529.683646] protocol 88fb is buggy, dev hsr_slave_0 [ 2529.688818] protocol 88fb is buggy, dev hsr_slave_1 [ 2533.853734] net_ratelimit: 14 callbacks suppressed [ 2533.853742] protocol 88fb is buggy, dev hsr_slave_0 [ 2533.863867] protocol 88fb is buggy, dev hsr_slave_1 [ 2534.003620] protocol 88fb is buggy, dev hsr_slave_0 [ 2534.008767] protocol 88fb is buggy, dev hsr_slave_1 [ 2534.403654] protocol 88fb is buggy, dev hsr_slave_0 [ 2534.408778] protocol 88fb is buggy, dev hsr_slave_1 [ 2534.413585] protocol 88fb is buggy, dev hsr_slave_0 [ 2534.418934] protocol 88fb is buggy, dev hsr_slave_1 [ 2535.923683] protocol 88fb is buggy, dev hsr_slave_0 [ 2535.928827] protocol 88fb is buggy, dev hsr_slave_1 [ 2540.083760] net_ratelimit: 14 callbacks suppressed [ 2540.083768] protocol 88fb is buggy, dev hsr_slave_0 [ 2540.093902] protocol 88fb is buggy, dev hsr_slave_1 [ 2540.253646] protocol 88fb is buggy, dev hsr_slave_0 [ 2540.258786] protocol 88fb is buggy, dev hsr_slave_1 [ 2540.643655] protocol 88fb is buggy, dev hsr_slave_0 [ 2540.648781] protocol 88fb is buggy, dev hsr_slave_1 [ 2540.653669] protocol 88fb is buggy, dev hsr_slave_0 [ 2540.658876] protocol 88fb is buggy, dev hsr_slave_1 [ 2542.173676] protocol 88fb is buggy, dev hsr_slave_0 [ 2542.178905] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.333671] net_ratelimit: 14 callbacks suppressed [ 2546.333680] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.343840] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.483631] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.488728] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.883643] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.883648] protocol 88fb is buggy, dev hsr_slave_0 [ 2546.883751] protocol 88fb is buggy, dev hsr_slave_1 [ 2546.888837] protocol 88fb is buggy, dev hsr_slave_1 [ 2548.403720] protocol 88fb is buggy, dev hsr_slave_0 [ 2548.408954] protocol 88fb is buggy, dev hsr_slave_1 [ 2552.573743] net_ratelimit: 14 callbacks suppressed [ 2552.573751] protocol 88fb is buggy, dev hsr_slave_0 [ 2552.583976] protocol 88fb is buggy, dev hsr_slave_1 [ 2552.723626] protocol 88fb is buggy, dev hsr_slave_0 [ 2552.728779] protocol 88fb is buggy, dev hsr_slave_1 [ 2553.123661] protocol 88fb is buggy, dev hsr_slave_0 [ 2553.128879] protocol 88fb is buggy, dev hsr_slave_1 [ 2553.133591] protocol 88fb is buggy, dev hsr_slave_0 [ 2553.139014] protocol 88fb is buggy, dev hsr_slave_1 [ 2554.643775] protocol 88fb is buggy, dev hsr_slave_0 [ 2554.649070] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.803681] net_ratelimit: 13 callbacks suppressed [ 2558.803691] protocol 88fb is buggy, dev hsr_slave_0 [ 2558.814053] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.963619] protocol 88fb is buggy, dev hsr_slave_0 [ 2558.968713] protocol 88fb is buggy, dev hsr_slave_1 [ 2559.363627] protocol 88fb is buggy, dev hsr_slave_0 [ 2559.363673] protocol 88fb is buggy, dev hsr_slave_0 [ 2559.368801] protocol 88fb is buggy, dev hsr_slave_1 [ 2559.373828] protocol 88fb is buggy, dev hsr_slave_1 [ 2560.883720] protocol 88fb is buggy, dev hsr_slave_0 [ 2560.889204] protocol 88fb is buggy, dev hsr_slave_1 [ 2565.043641] net_ratelimit: 14 callbacks suppressed [ 2565.043649] protocol 88fb is buggy, dev hsr_slave_0 [ 2565.048775] protocol 88fb is buggy, dev hsr_slave_1 [ 2565.203646] protocol 88fb is buggy, dev hsr_slave_0 [ 2565.208813] protocol 88fb is buggy, dev hsr_slave_1 [ 2565.603753] protocol 88fb is buggy, dev hsr_slave_0 [ 2565.608889] protocol 88fb is buggy, dev hsr_slave_1 [ 2565.613622] protocol 88fb is buggy, dev hsr_slave_0 [ 2565.619019] protocol 88fb is buggy, dev hsr_slave_1 [ 2567.123663] protocol 88fb is buggy, dev hsr_slave_0 [ 2567.128844] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.283671] net_ratelimit: 14 callbacks suppressed [ 2571.289001] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.294143] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.443644] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.448760] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.843634] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.848866] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.853600] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.859206] protocol 88fb is buggy, dev hsr_slave_1 [ 2573.373698] protocol 88fb is buggy, dev hsr_slave_0 [ 2573.379066] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.533707] net_ratelimit: 14 callbacks suppressed [ 2577.533714] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.543818] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.683632] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.688729] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.083651] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.083657] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.083781] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.088798] protocol 88fb is buggy, dev hsr_slave_1 [ 2579.603661] protocol 88fb is buggy, dev hsr_slave_0 [ 2579.608857] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.763650] net_ratelimit: 14 callbacks suppressed [ 2583.763660] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.773797] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.923633] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.928734] protocol 88fb is buggy, dev hsr_slave_1 [ 2584.323636] protocol 88fb is buggy, dev hsr_slave_0 [ 2584.323640] protocol 88fb is buggy, dev hsr_slave_0 [ 2584.323734] protocol 88fb is buggy, dev hsr_slave_1 [ 2584.328786] protocol 88fb is buggy, dev hsr_slave_1 [ 2585.843731] protocol 88fb is buggy, dev hsr_slave_0 [ 2585.848886] protocol 88fb is buggy, dev hsr_slave_1 [ 2590.013705] net_ratelimit: 14 callbacks suppressed [ 2590.013715] protocol 88fb is buggy, dev hsr_slave_0 [ 2590.023776] protocol 88fb is buggy, dev hsr_slave_1 [ 2590.163674] protocol 88fb is buggy, dev hsr_slave_0 [ 2590.168833] protocol 88fb is buggy, dev hsr_slave_1 [ 2590.563662] protocol 88fb is buggy, dev hsr_slave_0 [ 2590.563690] protocol 88fb is buggy, dev hsr_slave_0 [ 2590.568811] protocol 88fb is buggy, dev hsr_slave_1 [ 2590.573839] protocol 88fb is buggy, dev hsr_slave_1 [ 2592.093690] protocol 88fb is buggy, dev hsr_slave_0 [ 2592.098913] protocol 88fb is buggy, dev hsr_slave_1 [ 2594.003738] INFO: task kworker/1:2:2741 blocked for more than 140 seconds. [ 2594.010797] Not tainted 4.19.80 #0 [ 2594.015007] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2594.022973] kworker/1:2 D25152 2741 2 0x80000000 [ 2594.028775] Workqueue: events linkwatch_event [ 2594.033268] Call Trace: [ 2594.035915] __schedule+0x866/0x1dc0 [ 2594.039634] ? __mutex_lock+0x721/0x1300 [ 2594.043762] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2594.048856] ? kasan_check_read+0x11/0x20 [ 2594.052999] schedule+0x92/0x1c0 [ 2594.056414] schedule_preempt_disabled+0x13/0x20 [ 2594.061183] __mutex_lock+0x726/0x1300 [ 2594.065145] ? rtnl_lock+0x17/0x20 [ 2594.068691] ? mutex_trylock+0x1e0/0x1e0 [ 2594.072741] ? process_one_work+0x890/0x1750 [ 2594.077205] ? find_held_lock+0x35/0x130 [ 2594.081286] ? process_one_work+0x890/0x1750 [ 2594.085796] ? __lock_is_held+0xb6/0x140 [ 2594.089867] mutex_lock_nested+0x16/0x20 [ 2594.093993] ? mutex_lock_nested+0x16/0x20 [ 2594.098247] rtnl_lock+0x17/0x20 [ 2594.101734] linkwatch_event+0xf/0x70 [ 2594.105614] process_one_work+0x989/0x1750 [ 2594.109894] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2594.114646] ? lock_acquire+0x16f/0x3f0 [ 2594.118628] ? kasan_check_write+0x14/0x20 [ 2594.122870] ? do_raw_spin_lock+0xc8/0x240 [ 2594.127218] worker_thread+0x98/0xe40 [ 2594.131158] kthread+0x354/0x420 [ 2594.134585] ? process_one_work+0x1750/0x1750 [ 2594.139094] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2594.144984] ret_from_fork+0x24/0x30 [ 2594.148862] INFO: task kworker/1:0:31794 blocked for more than 140 seconds. [ 2594.156325] Not tainted 4.19.80 #0 [ 2594.156445] kobject: 'rx-0' (0000000022f7bc0f): kobject_cleanup, parent 00000000a706bfa1 [ 2594.160412] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2594.175020] kobject: 'rx-0' (0000000022f7bc0f): auto cleanup 'remove' event [ 2594.176706] kworker/1:0 D27296 31794 2 0x80000000 [ 2594.189003] kobject: 'rx-0' (0000000022f7bc0f): kobject_uevent_env [ 2594.189465] Workqueue: events switchdev_deferred_process_work [ 2594.197075] kobject: 'rx-0' (0000000022f7bc0f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2594.202676] Call Trace: [ 2594.215664] __schedule+0x866/0x1dc0 [ 2594.218243] kobject: 'rx-0' (0000000022f7bc0f): auto cleanup kobject_del [ 2594.219555] ? __mutex_lock+0x721/0x1300 [ 2594.228458] kobject: 'rx-0' (0000000022f7bc0f): calling ktype release [ 2594.230497] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2594.240640] kobject: 'rx-0': free name [ 2594.242136] ? kasan_check_read+0x11/0x20 [ 2594.248783] kobject: 'tx-0' (000000006974cba0): kobject_cleanup, parent 00000000a706bfa1 [ 2594.250334] schedule+0x92/0x1c0 [ 2594.261977] schedule_preempt_disabled+0x13/0x20 [ 2594.262238] kobject: 'tx-0' (000000006974cba0): auto cleanup 'remove' event [ 2594.266956] __mutex_lock+0x726/0x1300 [ 2594.277941] ? rtnl_lock+0x17/0x20 [ 2594.279979] kobject: 'tx-0' (000000006974cba0): kobject_uevent_env [ 2594.281489] ? mutex_trylock+0x1e0/0x1e0 [ 2594.288160] kobject: 'tx-0' (000000006974cba0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2594.291975] ? process_one_work+0x890/0x1750 [ 2594.306545] ? find_held_lock+0x35/0x130 [ 2594.307405] kobject: 'tx-0' (000000006974cba0): auto cleanup kobject_del [ 2594.310636] ? process_one_work+0x890/0x1750 [ 2594.318111] kobject: 'tx-0' (000000006974cba0): calling ktype release [ 2594.326873] ? __lock_is_held+0xb6/0x140 [ 2594.329123] kobject: 'tx-0': free name [ 2594.332795] mutex_lock_nested+0x16/0x20 [ 2594.336988] kobject: 'queues' (00000000a706bfa1): kobject_cleanup, parent (null) [ 2594.342697] ? mutex_lock_nested+0x16/0x20 [ 2594.349499] kobject: 'queues' (00000000a706bfa1): calling ktype release [ 2594.358360] rtnl_lock+0x17/0x20 [ 2594.360501] kobject: 'queues' (00000000a706bfa1): kset_release [ 2594.363795] switchdev_deferred_process_work+0xe/0x20 [ 2594.369753] kobject: 'queues': free name [ 2594.379830] process_one_work+0x989/0x1750 [ 2594.380816] kobject: 'bridge3207' (0000000058ceb7de): kobject_uevent_env [ 2594.384313] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2594.392306] kobject: 'bridge3207' (0000000058ceb7de): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2594.402071] ? lock_acquire+0x16f/0x3f0 [ 2594.410983] kobject: 'batman_adv' (00000000a0b2b17f): kobject_uevent_env [ 2594.411827] ? kasan_check_write+0x14/0x20 [ 2594.419022] kobject: 'batman_adv' (00000000a0b2b17f): kobject_uevent_env: filter function caused the event to drop! [ 2594.427837] ? do_raw_spin_lock+0xc8/0x240 [ 2594.434913] kobject: 'batman_adv' (00000000a0b2b17f): kobject_cleanup, parent (null) [ 2594.438692] worker_thread+0x98/0xe40 [ 2594.447850] kobject: 'batman_adv' (00000000a0b2b17f): calling ktype release [ 2594.456386] kthread+0x354/0x420 [ 2594.458909] kobject: (00000000a0b2b17f): dynamic_kobj_release [ 2594.461925] ? process_one_work+0x1750/0x1750 [ 2594.468183] kobject: 'batman_adv': free name [ 2594.477356] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2594.483030] ret_from_fork+0x24/0x30 [ 2594.487053] INFO: task syz-executor.5:29546 blocked for more than 140 seconds. [ 2594.494716] Not tainted 4.19.80 #0 [ 2594.498788] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2594.506845] syz-executor.5 D29336 29546 7520 0x00000004 [ 2594.512507] Call Trace: [ 2594.515168] __schedule+0x866/0x1dc0 [ 2594.518906] ? __mutex_lock+0x721/0x1300 [ 2594.522993] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2594.528088] ? kasan_check_read+0x11/0x20 [ 2594.532245] schedule+0x92/0x1c0 [ 2594.537670] schedule_preempt_disabled+0x13/0x20 [ 2594.542430] __mutex_lock+0x726/0x1300 [ 2594.546417] ? first_packet_length+0x640/0x640 [ 2594.551002] ? rtnl_lock+0x17/0x20 [ 2594.554623] ? mutex_trylock+0x1e0/0x1e0 [ 2594.558708] ? lock_downgrade+0x880/0x880 [ 2594.562865] mutex_lock_nested+0x16/0x20 [ 2594.568016] ? mutex_lock_nested+0x16/0x20 [ 2594.572278] rtnl_lock+0x17/0x20 [ 2594.575720] sock_do_ioctl+0x24e/0x2f0 [ 2594.579635] ? compat_ifr_data_ioctl+0x160/0x160 [ 2594.584575] ? mark_held_locks+0x100/0x100 [ 2594.588845] sock_ioctl+0x325/0x610 [ 2594.592462] ? dlci_ioctl_set+0x40/0x40 [ 2594.596489] ? __fget+0x340/0x540 [ 2594.599974] ? __might_sleep+0x95/0x190 [ 2594.604030] ? dlci_ioctl_set+0x40/0x40 [ 2594.608017] do_vfs_ioctl+0xd5f/0x1380 [ 2594.611896] ? selinux_file_ioctl+0x46f/0x5e0 [ 2594.617088] ? selinux_file_ioctl+0x125/0x5e0 [ 2594.621593] ? ioctl_preallocate+0x210/0x210 [ 2594.626093] ? selinux_file_mprotect+0x620/0x620 [ 2594.630961] ? iterate_fd+0x360/0x360 [ 2594.634920] ? nsecs_to_jiffies+0x30/0x30 [ 2594.639076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2594.644697] ? security_file_ioctl+0x8d/0xc0 [ 2594.649115] ksys_ioctl+0xab/0xd0 [ 2594.652559] __x64_sys_ioctl+0x73/0xb0 [ 2594.656497] do_syscall_64+0xfd/0x620 [ 2594.660307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2594.665583] RIP: 0033:0x459f49 [ 2594.668808] Code: Bad RIP value. [ 2594.672174] RSP: 002b:00007f08d7b76c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2594.679932] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 2594.688486] RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000004 [ 2594.695827] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2594.703110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08d7b776d4 [ 2594.710440] R13: 00000000004c3b30 R14: 00000000004d7be8 R15: 00000000ffffffff [ 2594.717823] INFO: task syz-executor.3:29653 blocked for more than 140 seconds. [ 2594.724043] kobject: 'rx-0' (00000000b53f64dd): kobject_cleanup, parent 000000004ef4b562 [ 2594.725573] Not tainted 4.19.80 #0 [ 2594.737954] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2594.740705] kobject: 'rx-0' (00000000b53f64dd): auto cleanup 'remove' event [ 2594.745993] syz-executor.3 D28216 29653 1 0x00000004 [ 2594.753230] kobject: 'rx-0' (00000000b53f64dd): kobject_uevent_env [ 2594.758753] Call Trace: [ 2594.758779] __schedule+0x866/0x1dc0 [ 2594.758793] ? __mutex_lock+0x721/0x1300 [ 2594.758814] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2594.758831] ? kasan_check_read+0x11/0x20 [ 2594.758848] schedule+0x92/0x1c0 [ 2594.758863] schedule_preempt_disabled+0x13/0x20 [ 2594.772114] kobject: 'rx-0' (00000000b53f64dd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2594.775765] __mutex_lock+0x726/0x1300 [ 2594.781186] kobject: 'rx-0' (00000000b53f64dd): auto cleanup kobject_del [ 2594.784974] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 2594.784993] ? __lock_acquire+0x6ee/0x49c0 [ 2594.785010] ? mutex_trylock+0x1e0/0x1e0 [ 2594.785033] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2594.810690] kobject: 'rx-0' (00000000b53f64dd): calling ktype release [ 2594.814493] ? lock_downgrade+0x880/0x880 [ 2594.818855] kobject: 'rx-0': free name [ 2594.823142] mutex_lock_nested+0x16/0x20 [ 2594.834192] kobject: 'tx-0' (000000002664c287): kobject_cleanup, parent 000000004ef4b562 [ 2594.838318] ? mutex_lock_nested+0x16/0x20 [ 2594.842378] kobject: 'tx-0' (000000002664c287): auto cleanup 'remove' event [ 2594.851488] rtnetlink_rcv_msg+0x40a/0xb00 [ 2594.859148] kobject: 'tx-0' (000000002664c287): kobject_uevent_env [ 2594.862978] ? rtnetlink_put_metrics+0x560/0x560 [ 2594.870449] kobject: 'tx-0' (000000002664c287): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2594.879390] ? netlink_deliver_tap+0x22d/0xc20 [ 2594.881073] kobject: 'tx-0' (000000002664c287): auto cleanup kobject_del [ 2594.885772] ? find_held_lock+0x35/0x130 [ 2594.898715] kobject: 'tx-0' (000000002664c287): calling ktype release [ 2594.907470] netlink_rcv_skb+0x17d/0x460 [ 2594.910640] kobject: 'tx-0': free name [ 2594.915504] ? rtnetlink_put_metrics+0x560/0x560 [ 2594.921252] kobject: 'queues' (000000004ef4b562): kobject_cleanup, parent (null) [ 2594.929239] ? netlink_ack+0xb30/0xb30 [ 2594.935117] kobject: 'queues' (000000004ef4b562): calling ktype release [ 2594.942995] ? kasan_check_read+0x11/0x20 [ 2594.946417] kobject: 'queues' (000000004ef4b562): kset_release [ 2594.952951] ? netlink_deliver_tap+0x254/0xc20 [ 2594.957411] kobject: 'queues': free name [ 2594.969530] rtnetlink_rcv+0x1d/0x30 [ 2594.972874] kobject: 'bridge3206' (0000000092a566f0): kobject_uevent_env [ 2594.975653] netlink_unicast+0x537/0x720 [ 2594.982583] kobject: 'bridge3206' (0000000092a566f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2594.991841] ? netlink_attachskb+0x770/0x770 [ 2594.999645] kobject: 'batman_adv' (000000009aa1fa5e): kobject_uevent_env [ 2595.001775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2595.008932] kobject: 'batman_adv' (000000009aa1fa5e): kobject_uevent_env: filter function caused the event to drop! [ 2595.019160] netlink_sendmsg+0x8ae/0xd70 [ 2595.025394] kobject: 'batman_adv' (000000009aa1fa5e): kobject_cleanup, parent (null) [ 2595.029020] ? netlink_unicast+0x720/0x720 [ 2595.038281] kobject: 'batman_adv' (000000009aa1fa5e): calling ktype release [ 2595.047238] ? selinux_socket_sendmsg+0x36/0x40 [ 2595.049747] kobject: (000000009aa1fa5e): dynamic_kobj_release [ 2595.055007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2595.060440] kobject: 'batman_adv': free name [ 2595.069656] ? security_socket_sendmsg+0x8d/0xc0 [ 2595.076223] ? netlink_unicast+0x720/0x720 [ 2595.080579] sock_sendmsg+0xd7/0x130 [ 2595.084862] __sys_sendto+0x262/0x380 [ 2595.088677] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2595.093359] ? __do_page_fault+0x676/0xe90 [ 2595.097752] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2595.103304] ? up_read+0x1a/0x110 [ 2595.106836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2595.112548] ? __do_page_fault+0x484/0xe90 [ 2595.117006] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 2595.122923] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2595.127757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2595.132538] ? do_syscall_64+0x26/0x620 [ 2595.136652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2595.142030] __x64_sys_sendto+0xe1/0x1a0 [ 2595.146175] do_syscall_64+0xfd/0x620 [ 2595.150000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2595.155269] RIP: 0033:0x413c43 [ 2595.158461] Code: 0f bf bc 24 c8 00 00 00 e8 ba 76 ff ff 66 41 c7 84 24 c8 00 00 00 ff ff ba 9c 24 44 00 89 5d 00 4c 89 e1 be ff ff ff ff 31 ff <31> c0 ff 15 5d 5c 24 00 ba 29 f8 ff ff e9 27 ff ff ff 0f 1f 00 41 [ 2595.177549] RSP: 002b:00007ffe8b4c4fa8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2595.185396] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000413c43 [ 2595.192764] RDX: 0000000000000028 RSI: 0000000000a71df0 RDI: 0000000000000003 [ 2595.200670] RBP: 00007ffe8b4c5010 R08: 00007ffe8b4c4fb0 R09: 000000000000000c [ 2595.208125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2595.215454] R13: 00007ffe8b4c5318 R14: 0000000000000000 R15: 0000000000000000 [ 2595.222756] INFO: task syz-executor.1:29655 blocked for more than 140 seconds. [ 2595.230188] Not tainted 4.19.80 #0 [ 2595.234296] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2595.242453] syz-executor.1 D28216 29655 1 0x00000004 [ 2595.248137] Call Trace: [ 2595.250747] __schedule+0x866/0x1dc0 [ 2595.254498] ? __mutex_lock+0x721/0x1300 [ 2595.258571] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2595.263660] ? kasan_check_read+0x11/0x20 [ 2595.267823] schedule+0x92/0x1c0 [ 2595.271217] schedule_preempt_disabled+0x13/0x20 [ 2595.276029] __mutex_lock+0x726/0x1300 [ 2595.280024] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 2595.284978] ? mutex_trylock+0x1e0/0x1e0 [ 2595.289155] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2595.293663] ? lock_downgrade+0x880/0x880 [ 2595.297908] mutex_lock_nested+0x16/0x20 [ 2595.301996] ? mutex_lock_nested+0x16/0x20 [ 2595.306480] rtnetlink_rcv_msg+0x40a/0xb00 [ 2595.310728] ? rtnetlink_put_metrics+0x560/0x560 [ 2595.315567] ? netlink_deliver_tap+0x22d/0xc20 [ 2595.320170] ? find_held_lock+0x35/0x130 [ 2595.325046] netlink_rcv_skb+0x17d/0x460 [ 2595.329137] ? rtnetlink_put_metrics+0x560/0x560 [ 2595.333945] ? netlink_ack+0xb30/0xb30 [ 2595.337850] ? kasan_check_read+0x11/0x20 [ 2595.341992] ? netlink_deliver_tap+0x254/0xc20 [ 2595.346640] rtnetlink_rcv+0x1d/0x30 [ 2595.350362] netlink_unicast+0x537/0x720 [ 2595.354488] ? netlink_attachskb+0x770/0x770 [ 2595.360059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2595.365672] netlink_sendmsg+0x8ae/0xd70 [ 2595.369961] ? netlink_unicast+0x720/0x720 [ 2595.374256] ? selinux_socket_sendmsg+0x36/0x40 [ 2595.378931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2595.384523] ? security_socket_sendmsg+0x8d/0xc0 [ 2595.389301] ? netlink_unicast+0x720/0x720 [ 2595.393618] sock_sendmsg+0xd7/0x130 [ 2595.397354] __sys_sendto+0x262/0x380 [ 2595.401144] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2595.405873] ? __do_page_fault+0x676/0xe90 [ 2595.410195] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2595.415888] ? up_read+0x1a/0x110 [ 2595.419355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2595.424952] ? __do_page_fault+0x484/0xe90 [ 2595.429198] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 2595.435151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2595.439923] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2595.444753] ? do_syscall_64+0x26/0x620 [ 2595.448816] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2595.454874] __x64_sys_sendto+0xe1/0x1a0 [ 2595.458949] do_syscall_64+0xfd/0x620 [ 2595.462753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2595.467998] RIP: 0033:0x413c43 [ 2595.471197] Code: 0f bf bc 24 c8 00 00 00 e8 ba 76 ff ff 66 41 c7 84 24 c8 00 00 00 ff ff ba 9c 24 44 00 89 5d 00 4c 89 e1 be ff ff ff ff 31 ff <31> c0 ff 15 5d 5c 24 00 ba 29 f8 ff ff e9 27 ff ff ff 0f 1f 00 41 [ 2595.490233] RSP: 002b:00007ffd50c0fe78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2595.497978] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000413c43 [ 2595.505320] RDX: 0000000000000028 RSI: 0000000000a71df0 RDI: 0000000000000003 [ 2595.512598] RBP: 00007ffd50c0fee0 R08: 00007ffd50c0fe80 R09: 000000000000000c [ 2595.519922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2595.527556] R13: 00007ffd50c101e8 R14: 0000000000000000 R15: 0000000000000000 [ 2595.534996] [ 2595.534996] Showing all locks held in the system: [ 2595.541335] 1 lock held by khungtaskd/1036: [ 2595.546126] kobject: 'rx-0' (0000000093cb8103): kobject_cleanup, parent 000000004cdd3969 [ 2595.547994] #0: [ 2595.554425] kobject: 'rx-0' (0000000093cb8103): auto cleanup 'remove' event [ 2595.554434] kobject: 'rx-0' (0000000093cb8103): kobject_uevent_env [ 2595.554443] kobject: 'rx-0' (0000000093cb8103): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2595.554450] kobject: 'rx-0' (0000000093cb8103): auto cleanup kobject_del [ 2595.554502] kobject: 'rx-0' (0000000093cb8103): calling ktype release [ 2595.558036] 0000000032d0928a [ 2595.563684] kobject: 'rx-0': free name [ 2595.563767] kobject: 'tx-0' (00000000a8055663): kobject_cleanup, parent 000000004cdd3969 [ 2595.563778] kobject: 'tx-0' (00000000a8055663): auto cleanup 'remove' event [ 2595.575110] ( [ 2595.580458] kobject: 'tx-0' (00000000a8055663): kobject_uevent_env [ 2595.591516] rcu_read_lock [ 2595.594619] kobject: 'tx-0' (00000000a8055663): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2595.599086] ){....} [ 2595.600940] kobject: 'tx-0' (00000000a8055663): auto cleanup kobject_del [ 2595.617056] , at: debug_show_all_locks+0x5f/0x27e [ 2595.619690] kobject: 'tx-0' (00000000a8055663): calling ktype release [ 2595.627706] 3 locks held by kworker/1:2/2741: [ 2595.637672] kobject: 'tx-0': free name [ 2595.637714] kobject: 'queues' (000000004cdd3969): kobject_cleanup, parent (null) [ 2595.637722] kobject: 'queues' (000000004cdd3969): calling ktype release [ 2595.637731] kobject: 'queues' (000000004cdd3969): kset_release [ 2595.637743] kobject: 'queues': free name [ 2595.643297] #0: [ 2595.647449] kobject: 'bridge3205' (00000000dda46f52): kobject_uevent_env [ 2595.657279] 000000008ceddc51 [ 2595.658496] kobject: 'bridge3205' (00000000dda46f52): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2595.662915] ( [ 2595.668529] kobject: 'batman_adv' (00000000028717c3): kobject_uevent_env [ 2595.680715] (wq_completion)"events" [ 2595.682181] kobject: 'batman_adv' (00000000028717c3): kobject_uevent_env: filter function caused the event to drop! [ 2595.688511] ){+.+.} [ 2595.692345] kobject: 'batman_adv' (00000000028717c3): kobject_cleanup, parent (null) [ 2595.700259] , at: process_one_work+0x87e/0x1750 [ 2595.701652] kobject: 'batman_adv' (00000000028717c3): calling ktype release [ 2595.705143] #1: [ 2595.715348] kobject: (00000000028717c3): dynamic_kobj_release [ 2595.715367] kobject: 'batman_adv': free name [ 2595.774140] 00000000f5e3845f ((linkwatch_work).work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2595.782989] #2: 00000000df0c94aa (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2595.790401] 2 locks held by rsyslogd/7340: [ 2595.794677] #0: 00000000b92f9b63 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 2595.802594] #1: 00000000ad1868a1 (&rq->lock){-.-.}, at: __schedule+0x1f8/0x1dc0 [ 2595.810212] 2 locks held by getty/7463: [ 2595.814227] #0: 00000000f83b2d7c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2595.822579] #1: 00000000c5771ad6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2595.831679] 2 locks held by getty/7464: [ 2595.835677] #0: 0000000048110204 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2595.844737] #1: 00000000402174d2 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2595.853649] 2 locks held by getty/7465: [ 2595.857632] #0: 00000000c4ee77f0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2595.865999] #1: 00000000d457af7e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2595.875217] 2 locks held by getty/7466: [ 2595.879303] #0: 00000000c16f237c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2595.887644] #1: 000000008a81359d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2595.896669] 2 locks held by getty/7467: [ 2595.900760] #0: 000000003137a9ff (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2595.909118] #1: 00000000bacdbe90 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2595.918186] 2 locks held by getty/7468: [ 2595.922148] #0: 000000006cc79aa5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2595.930553] #1: 00000000754e3ce4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2595.939501] 2 locks held by getty/7469: [ 2595.943639] #0: 000000000958f89e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2595.952085] #1: 000000004458f52a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2595.961053] 3 locks held by kworker/1:0/31794: [ 2595.965705] #0: 000000008ceddc51 ((wq_completion)"events"){+.+.}, at: process_one_work+0x87e/0x1750 [ 2595.975055] #1: 0000000044dc5a14 (deferred_process_work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2595.985453] #2: 00000000df0c94aa (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2595.992750] 4 locks held by kworker/u4:2/8070: [ 2595.997388] #0: 0000000008cda83e ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x87e/0x1750 [ 2596.007313] #1: 00000000dfb6ff9e (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2596.016176] #2: 00000000981687aa (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 2596.024494] #3: 00000000df0c94aa (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2596.031815] 3 locks held by kworker/0:1/2025: [ 2596.036372] #0: 00000000041121e2 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x87e/0x1750 [ 2596.046904] #1: 00000000b1915ca2 ((addr_chk_work).work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2596.055995] #2: 00000000df0c94aa (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2596.063337] 1 lock held by syz-executor.5/29546: [ 2596.068267] #0: 00000000df0c94aa (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2596.075655] 1 lock held by syz-executor.3/29653: [ 2596.080461] #0: 00000000df0c94aa (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40a/0xb00 [ 2596.089576] 1 lock held by syz-executor.1/29655: [ 2596.094387] #0: 00000000df0c94aa (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40a/0xb00 [ 2596.102815] [ 2596.104568] ============================================= [ 2596.104568] [ 2596.111671] NMI backtrace for cpu 1 [ 2596.115386] CPU: 1 PID: 1036 Comm: khungtaskd Not tainted 4.19.80 #0 [ 2596.121878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2596.124795] kobject: 'rx-0' (00000000cfa3cdd8): kobject_cleanup, parent 00000000cc77bcb2 [ 2596.131236] Call Trace: [ 2596.141334] kobject: 'rx-0' (00000000cfa3cdd8): auto cleanup 'remove' event [ 2596.142232] dump_stack+0x172/0x1f0 [ 2596.149865] kobject: 'rx-0' (00000000cfa3cdd8): kobject_uevent_env [ 2596.153041] nmi_cpu_backtrace.cold+0x63/0xa4 [ 2596.159668] kobject: 'rx-0' (00000000cfa3cdd8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2596.163852] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 2596.163869] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 2596.163884] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2596.163899] watchdog+0x9df/0xee0 [ 2596.174596] kobject: 'rx-0' (00000000cfa3cdd8): auto cleanup kobject_del [ 2596.179015] kthread+0x354/0x420 [ 2596.184773] kobject: 'rx-0' (00000000cfa3cdd8): calling ktype release [ 2596.189551] ? reset_hung_task_detector+0x30/0x30 [ 2596.192997] kobject: 'rx-0': free name [ 2596.200036] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2596.200052] ret_from_fork+0x24/0x30 [ 2596.200209] Sending NMI from CPU 1 to CPUs 0: [ 2596.209620] kobject: 'tx-0' (000000003e4b7521): kobject_cleanup, parent 00000000cc77bcb2 [ 2596.211194] NMI backtrace for cpu 0 [ 2596.211200] CPU: 0 PID: 8070 Comm: kworker/u4:2 Not tainted 4.19.80 #0 [ 2596.211207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2596.211211] Workqueue: netns cleanup_net [ 2596.211217] RIP: 0010:io_serial_in+0x6b/0x90 [ 2596.211229] Code: e1 00 00 00 49 8d 7c 24 38 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 d3 e3 80 3c 02 00 75 17 41 03 5c 24 38 89 da ec <5b> 0f b6 c0 41 5c 5d c3 e8 28 4c 35 fe eb c2 e8 81 4c 35 fe eb e2 [ 2596.211234] RSP: 0018:ffff88821b18f4b8 EFLAGS: 00000002 [ 2596.211242] RAX: dffffc0000000000 RBX: 00000000000003fd RCX: 0000000000000000 [ 2596.211248] RDX: 00000000000003fd RSI: ffffffff836c1061 RDI: ffffffff8ad86ef8 [ 2596.211253] RBP: ffff88821b18f4c8 R08: ffff88805b240340 R09: fffffbfff15b0dd9 [ 2596.211259] R10: fffffbfff15b0dd8 R11: ffffffff8ad86ec3 R12: ffffffff8ad86ec0 [ 2596.211264] R13: 0000000000000020 R14: 0000000000000000 R15: fffffbfff15b0de1 [ 2596.211270] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2596.211275] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2596.211281] CR2: 00007fc9e8002440 CR3: 000000009544c000 CR4: 00000000001406f0 [ 2596.211286] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2596.211292] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2596.211295] Call Trace: [ 2596.211299] wait_for_xmitr+0xa1/0x230 [ 2596.211304] serial8250_console_putchar+0x1f/0x60 [ 2596.211308] uart_console_write+0x54/0x110 [ 2596.211311] ? wait_for_xmitr+0x230/0x230 [ 2596.211316] serial8250_console_write+0x638/0x9f0 [ 2596.211321] ? serial8250_em485_handle_start_tx+0x490/0x490 [ 2596.211325] ? lock_acquire+0x16f/0x3f0 [ 2596.211329] ? console_unlock+0x41f/0x10b0 [ 2596.211333] univ8250_console_write+0x5f/0x70 [ 2596.211337] ? univ8250_console_setup+0x160/0x160 [ 2596.211341] console_unlock+0xbde/0x10b0 [ 2596.211345] vprintk_emit+0x238/0x690 [ 2596.211349] vprintk_default+0x28/0x30 [ 2596.211353] vprintk_func+0x7e/0x189 [ 2596.211356] ? kernfs_put+0x351/0x5d0 [ 2596.211360] printk+0xba/0xed [ 2596.211364] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 2596.211369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2596.211373] ? kernfs_put+0x3c2/0x5d0 [ 2596.211377] kobject_put.cold+0x88/0x2e6 [ 2596.211381] netdev_queue_update_kobjects+0x250/0x3d0 [ 2596.211386] netdev_unregister_kobject+0x162/0x1f0 [ 2596.211390] rollback_registered_many+0x6bb/0xda0 [ 2596.211394] ? br_dev_open+0x70/0x70 [ 2596.211398] ? generic_xdp_install+0x3d0/0x3d0 [ 2596.211403] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2596.211408] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 2596.211412] unregister_netdevice_many.part.0+0x1b/0x1f0 [ 2596.211416] default_device_exit_batch+0x34e/0x410 [ 2596.211421] ? unregister_netdevice_many+0x50/0x50 [ 2596.211425] ? rtnl_unlock+0xe/0x10 [ 2596.211429] ? do_wait_intr_irq+0x2b0/0x2b0 [ 2596.211432] ? rtnl_unlock+0xe/0x10 [ 2596.211437] ? unregister_netdevice_many+0x50/0x50 [ 2596.211441] ? dev_change_net_namespace+0xc60/0xc60 [ 2596.211445] ops_exit_list.isra.0+0xfc/0x150 [ 2596.211449] cleanup_net+0x3fb/0x960 [ 2596.211453] ? unregister_pernet_device+0x80/0x80 [ 2596.211457] ? __lock_is_held+0xb6/0x140 [ 2596.211461] process_one_work+0x989/0x1750 [ 2596.211465] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2596.211469] ? lock_acquire+0x16f/0x3f0 [ 2596.211473] ? kasan_check_write+0x14/0x20 [ 2596.211477] ? do_raw_spin_lock+0xc8/0x240 [ 2596.211481] worker_thread+0x98/0xe40 [ 2596.211485] ? trace_hardirqs_on+0x67/0x220 [ 2596.211489] kthread+0x354/0x420 [ 2596.211493] ? process_one_work+0x1750/0x1750 [ 2596.211498] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2596.211501] ret_from_fork+0x24/0x30 [ 2596.211512] Kernel panic - not syncing: hung_task: blocked tasks [ 2596.221062] kobject: 'tx-0' (000000003e4b7521): auto cleanup 'remove' event [ 2596.224972] CPU: 1 PID: 1036 Comm: khungtaskd Not tainted 4.19.80 #0 [ 2596.224980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2596.224985] Call Trace: [ 2596.225005] dump_stack+0x172/0x1f0 [ 2596.225024] panic+0x26a/0x50e [ 2596.225038] ? __warn_printk+0xf3/0xf3 [ 2596.225055] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2596.230132] kobject: 'tx-0' (000000003e4b7521): kobject_uevent_env [ 2596.233440] ? printk_safe_flush+0xf2/0x140 [ 2596.242019] kobject: 'tx-0' (000000003e4b7521): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2596.245281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2596.245299] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 2596.245313] ? nmi_trigger_cpumask_backtrace+0x16e/0x1f8 [ 2596.245329] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 2596.252085] kobject: 'tx-0' (000000003e4b7521): auto cleanup kobject_del [ 2596.261325] watchdog+0x9f0/0xee0 [ 2596.261348] kthread+0x354/0x420 [ 2596.261362] ? reset_hung_task_detector+0x30/0x30 [ 2596.266906] kobject: 'tx-0' (000000003e4b7521): calling ktype release [ 2596.269823] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2596.289195] kobject: 'tx-0': free name [ 2596.294064] ret_from_fork+0x24/0x30 [ 2596.302931] Kernel Offset: disabled [ 2596.724869] Rebooting in 86400 seconds..