88e20480e58beef1b69ef0bb23189cf7ba24ab0e445ddebf8a4", 0x81}, {&(0x7f000000d480)="1c8c703be2c79bbc318a6c5104664287330d2402cd9f29cedb049b94d028d1f1790a7f0aa85e3aebdf49093f297db9525e4454c527906bb0576d94b9ca0dd50c9d4349f35cb9dfed148437724b449436037736cd3e129f386a514da4c9b35dc959746e123b11ec97a3969f67a4aaf8cdb61a21ca2b6b3c46a794f87645aab87dd4d1589e3a7200835149189bbf9c68d05ec2adf9b543da11a14c358ff6b0dcd2bada01f977a9ad79f618110ca2bfc52bc65954ce42f4b85afe88fc2b6ce79ca66aac9d3fa88e75db185a23f1c691eaa33548e10fe3ddcab2d6d0cba3ff525ad3e96338", 0xe3}], 0x2, &(0x7f000000d5c0)=[{0x60, 0x0, 0x4, "4cfe9a64acdbc370f04c8c78fed02d26e246b17d33a37c11f80a7230e27618118d3497c9f1653a636a5beae203613456f388b94039a253acca8946fc3151229381cedbc3f2adfefbf7cb9aa2183404"}, {0xe0, 0x109, 0xffff, "79f73481c0d39d75b403436b3190b3fb5b7c04cfc28eeb439ea0d66de5140dab157111c56873a82ab076e8e0209a9213b11352a7550863010a76e945a4b030e7635d598fb782125826654ef3eb3738d5548ba7206df2264fbcfd0e196c22065f671ddaf563fd7190b39fbee647828033a55d37342d32aa3e2a3a2166c5f986e6bb74126c4326e2dc3366fd66e81c5adbbd702a2b245ca288c2a38a18c6cb4d534d8e4039899988413196805254858c84bfe619ba1bce0cddbedab4d71fd79fed8a5d8a00ae47de613b7b88b05e42"}, {0x48, 0x115, 0x323, "2ec0a98806a4ff967c31dc92a2dabffa7d1b958643453efb67baa02478945112f50c54b5bbb60b0740b724285401e0adfd"}, {0x1010, 0x112, 0x400, "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"}], 0x1198}, 0x5c}], 0x9, 0x8840) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, r3) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x221d5bee, 0x10000) setns(r4, 0x40020000) connect$can_bcm(r1, &(0x7f0000000000), 0x10) [ 973.479367] loop1: p1 < > p4 [ 973.524558] loop1: partition table partially beyond EOD, truncated [ 973.549751] loop1: p1 size 2 extends beyond EOD, truncated [ 973.636889] loop1: p4 start 1854537728 is beyond EOD, truncated [ 973.765111] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 973.879782] buffer_io_error: 60 callbacks suppressed [ 973.879793] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.903208] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.910801] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.918675] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.927164] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.935345] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.943093] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.951199] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.959116] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 973.967642] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:45:37 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0d*\x02\x00', @ifru_flags}) 03:45:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8e}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x81, 0x3, 0x204, 0x3, 0x2, 0x7fff, 0xff, 0x101, r2}, &(0x7f0000000140)=0x20) ftruncate(r1, 0x2) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:37 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:37 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:37 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r1, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:37 executing program 5: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x20000, 0x0) getsockopt$inet_int(r2, 0x0, 0x15, &(0x7f0000000280), &(0x7f0000000180)=0xffa2) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000200)={0x22, 0x3a, 0xe, 0x3, 0xa, 0x8e7, 0x6, 0x101, 0x1}) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'vcan0\x00'}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x1, 0x0) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000240)={0x3, "19aacab3fe17c956f1d4e83d79d480b294c4237b7eb11f3d3fc65f0beac738d6", 0x2, 0x20, 0x1, 0x1, 0x5, 0x2, 0x7fff, 0x2}) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r1, 0x0, 0xfffffffffffffce2, &(0x7f0000000200)='posix_acl_access\x00', 0xffffffffffffffff}, 0xffffffffffffffe7) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x480000, 0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x7fff, 0x898, 0x1, 0x2, 0x0, 0xbbad, 0x4, 0xe, 0x80000001, 0x7e8, 0x401, 0x2, 0x4, 0x131bf63b, 0x8, 0x1, 0x2, 0x2, 0x0, 0x3, 0x4, 0x58, 0x200, 0x80, 0x20, 0x9, 0x55, 0x4, 0x8, 0x3, 0x5, 0x4, 0x3, 0x3, 0x2, 0xffffffff00000000, 0x0, 0x3, 0x7, @perf_bp={&(0x7f0000000000), 0xb}, 0x80, 0x0, 0xfffffffffffff144, 0xf, 0x2, 0x2, 0x5}, r4, 0x6, r1, 0x0) [ 974.214028] net_ratelimit: 19 callbacks suppressed [ 974.214036] protocol 88fb is buggy, dev hsr_slave_0 [ 974.224174] protocol 88fb is buggy, dev hsr_slave_1 [ 974.229272] protocol 88fb is buggy, dev hsr_slave_0 [ 974.234360] protocol 88fb is buggy, dev hsr_slave_1 [ 974.286271] IPVS: ftp: loaded support on port[0] = 21 [ 974.407362] loop1: p1 < > p4 [ 974.410781] loop1: partition table partially beyond EOD, truncated [ 974.561556] loop1: p1 size 2 extends beyond EOD, truncated [ 974.629905] loop1: p4 start 1854537728 is beyond EOD, truncated [ 974.790280] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:37 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r1, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:38 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 975.213504] loop1: p1 < > p4 [ 975.227964] loop1: partition table partially beyond EOD, truncated 03:45:38 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000040)={'ip6_vti0\x00', 0xff}) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 975.283348] loop1: p1 size 2 extends beyond EOD, truncated [ 975.368587] loop1: p4 start 1854537728 is beyond EOD, truncated [ 975.414053] protocol 88fb is buggy, dev hsr_slave_0 [ 975.414058] protocol 88fb is buggy, dev hsr_slave_0 [ 975.414091] protocol 88fb is buggy, dev hsr_slave_1 [ 975.419196] protocol 88fb is buggy, dev hsr_slave_1 [ 975.424300] protocol 88fb is buggy, dev hsr_slave_0 [ 975.439383] protocol 88fb is buggy, dev hsr_slave_1 [ 975.481455] IPVS: ftp: loaded support on port[0] = 21 [ 975.655153] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:40 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r1, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) r2 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$alg(r2, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r4 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r5 = dup3(r4, r2, 0x0) write$UHID_INPUT(r5, &(0x7f0000001440)={0x8, "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", 0x1000}, 0x1006) recvmmsg(r4, &(0x7f0000008cc0)=[{{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x2000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:40 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x7, 0x0, 0x10000, 0x3ff}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000100)={0x0, r2}) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:40 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:40 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0e*\x02\x00', @ifru_flags}) [ 977.813058] IPVS: ftp: loaded support on port[0] = 21 [ 977.997401] loop1: p1 < > p4 [ 978.009226] loop1: partition table partially beyond EOD, truncated [ 978.044738] loop1: p1 size 2 extends beyond EOD, truncated [ 978.120006] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:41 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x108) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = shmget(0x1, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/65) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x84201, 0x0) sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 978.402308] print_req_error: 78 callbacks suppressed [ 978.402320] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 978.415013] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 978.443630] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 978.450680] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 978.459104] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 978.467137] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 978.475486] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 978.484679] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:45:41 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x200100, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r3, &(0x7f0000000280)='./file0\x00', 0x1000) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) connect$pppoe(r1, &(0x7f0000000300)={0x18, 0x0, {0x1, @broadcast, 'veth0_to_bond\x00'}}, 0x1e) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8001) 03:45:41 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x8, 0x40) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x0, 0x7ff}, 0x8) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 978.491668] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 978.502146] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 978.510617] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:45:41 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r1, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:41 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040), 0x2) 03:45:41 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) fcntl$addseals(r3, 0x409, 0xe) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:41 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e21, @multicast1}}) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9, 0x40) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000100)={0xb176, 0xfffffffffffffc00, 0x401, 0x6, 0xfffffffffffff7e8, 0x800}) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 979.013853] loop1: p1 < > p4 [ 979.021182] loop1: partition table partially beyond EOD, truncated 03:45:42 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000000)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x11dc, &(0x7f0000000100), 0xfffffeca}}], 0x1, 0x4000) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x4, 0x5, 0x6}) 03:45:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x80004, @link_local, 'ip6gretap0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 979.106114] loop1: p1 size 2 extends beyond EOD, truncated [ 979.144954] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:42 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0f*\x02\x00', @ifru_flags}) [ 979.319984] buffer_io_error: 20 callbacks suppressed [ 979.319994] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.333567] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 979.341110] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.349184] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.357553] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:45:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x2010080, &(0x7f00000001c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_off='index=off'}, {@workdir={'workdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfshat={'smackfshat', 0x3d, 'vmnet0em0selinux@'}}, {@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, '0'}}, {@subj_type={'subj_type', 0x3d, 'bond0\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'em1#'}}, {@uid_gt={'uid>', r3}}]}) r4 = getpid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000002c0)=r4) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x4, 0xd9, 0x8, 0x6, 0x0, 0x461, 0x80080, 0x2, 0x6cdd, 0xffff, 0x2, 0x9, 0x8, 0xffffffffffffffe0, 0x3732f053, 0xfffffffffffffffd, 0x0, 0x9, 0x16f, 0x1, 0x7fff, 0x2, 0x6e0, 0x2, 0x6, 0xfffffffffffffff9, 0x9, 0x8, 0xffffffff, 0x8, 0x9, 0x7ff, 0xfffffffeffffffff, 0x9, 0x41, 0x7f, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000300), 0x2}, 0x1082, 0x5, 0x8, 0xf, 0x3f, 0x1, 0x101}, r4, 0x4, r1, 0x2) sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 979.365413] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.373424] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.381360] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.389192] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.397057] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.413383] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 979.486377] IPVS: ftp: loaded support on port[0] = 21 03:45:42 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r1, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 979.574055] net_ratelimit: 8 callbacks suppressed [ 979.574063] protocol 88fb is buggy, dev hsr_slave_0 [ 979.584063] protocol 88fb is buggy, dev hsr_slave_0 [ 979.584104] protocol 88fb is buggy, dev hsr_slave_1 [ 979.589121] protocol 88fb is buggy, dev hsr_slave_1 [ 979.594217] protocol 88fb is buggy, dev hsr_slave_0 [ 979.604249] protocol 88fb is buggy, dev hsr_slave_1 03:45:42 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:42 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 979.911816] loop1: p1 < > p4 [ 979.942745] loop1: partition table partially beyond EOD, truncated [ 979.998866] loop1: p1 size 2 extends beyond EOD, truncated 03:45:43 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x6, 0x200) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) clock_gettime(0xfffffffffffffffe, &(0x7f00000003c0)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x1d, r4}, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)={0x6, 0x280, 0x7, {0x0, 0x7530}, {r5, r6/1000+10000}, {0x4, 0x2, 0x500, 0x3ff}, 0x1, @can={{0x0, 0x7a4, 0x5, 0x2}, 0x2, 0x1, 0x0, 0x0, "6db6467b93cdfa5f"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20000800) socket$inet(0x2, 0x3, 0x7f) rt_sigsuspend(&(0x7f0000000440)={0x4e20}, 0x8) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000400)={0x45c, 0x7, 0x2000}, 0x4) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000480)={0x400000, 0x5, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) connect$can_bcm(r8, &(0x7f0000000000)={0x1d, r4}, 0xfffffffffffffe39) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x1b, &(0x7f0000000280), 0x4) [ 980.075874] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 03:45:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c010000afa1e0d99c424f3d9870f81568abd42aa8518eda2f37dca882000000000000000000000000000045248d43ef5b8abf819b3c9a043117ad3a61bdd5ab83f87ae4fa7b5748d7c0f18fe526e93c6004c180a1155bdc9e3fc9ca5e8f7d4bd713897b2aede43df7cdc846214b627b3af7b5c4e4fdbd26a6a0666a3a67c8aa4e91eeb1a923cec747ac1102239cce29c7eeec1451f0f69dedfe59026ca05d2baa5ce63ee23e4c70b1f42975b8c182d1e9f228ae193a16b9", @ANYRES16=r2, @ANYBLOB="01002cbd7000fbdbdf25040000000800060004000000"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 980.260417] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 980.384031] protocol 88fb is buggy, dev hsr_slave_0 [ 980.389186] protocol 88fb is buggy, dev hsr_slave_1 03:45:43 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r1, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:43 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffb8b, 0x10042) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100), 0x33f}}], 0x1b3, 0x0) [ 980.454076] protocol 88fb is buggy, dev hsr_slave_0 [ 980.459253] protocol 88fb is buggy, dev hsr_slave_1 03:45:43 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 980.787716] loop1: p1 < > p4 [ 980.806074] loop1: partition table partially beyond EOD, truncated 03:45:43 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0g*\x02\x00', @ifru_flags}) [ 980.869919] loop1: p1 size 2 extends beyond EOD, truncated [ 980.909127] loop1: p4 start 1854537728 is beyond EOD, truncated [ 981.007962] IPVS: ftp: loaded support on port[0] = 21 [ 981.108914] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x800003, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000140)=0x1ff) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x60980, 0x30) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000240)={@local, 0x0}, &(0x7f0000000280)=0x14) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000140)={0xfffffffffffff001, "158dd9f6bbfba73b455a717b1129351aa02d54bd1736c8483ff29965f3e118d5"}) sendto$packet(r2, &(0x7f0000000040)="1b86a951d16f06c681c7", 0xa, 0x20000040, &(0x7f00000002c0)={0x11, 0x1f, r3, 0x1, 0x8}, 0x14) 03:45:44 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r1, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:44 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000000240)="65f1e58be3b7e9c98aef543b981f78687f1c98e7b872632a32790547bf3bedf1808d5fd21c0d20baf636c765d8048ae918fe21d9f730e31ca8e4d621a97fc66081b4f28510069a672c6b8b8b39e62b83b4db45ecac1258f82bda11282b19009cf3a5a04a2cbf6ba4ea06008c90970dce0a7292fc7f318c991f191543335e2574d129dbfb4fade3ccca5c69c99eb3ca527c61badab50ef3e2e4337a89d60d81e808ded9b996fe9af338b555312d632c67d53dd92f7b1b5a206ed88dbd9c32c766b0cdb2b3c2e912ef9c8150bd20ccc23ecddea5a27a0a0ab4400ac621", 0xdc, 0x8000, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x101, 0x840) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000001c0)={0xfffffffffffffff8, 0xc1, 0x8}) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000009000)={0x18, 0x0, {0xffffffbfffffffff, @link_local, 'bond0\x00'}}, 0x1e) recvmmsg(r2, &(0x7f0000008e00)=[{{&(0x7f000000a240)=@caif=@rfm, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000240)=""/41, 0x1}, {&(0x7f0000009140)=""/198, 0xc6}, {&(0x7f0000000380)=""/212, 0xd4}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/67, 0x43}, {&(0x7f0000001500)=""/188, 0xbc}, {&(0x7f0000009240)=""/4096, 0x1000}], 0x8, &(0x7f0000002640)=""/47, 0x2f}}, {{&(0x7f0000002680)=@isdn, 0x80, &(0x7f0000002800)=[{&(0x7f0000002700)=""/197, 0xc5}, {&(0x7f0000002a00)=""/4096, 0xfffffffffffffc2e}], 0x2, &(0x7f0000002840)=""/194, 0xc2}, 0x4}, {{&(0x7f0000003a00)=@tipc=@name, 0x80, &(0x7f0000000080)=[{&(0x7f0000002940)=""/10, 0xa}], 0x1, &(0x7f0000003ac0)=""/95, 0x5f}, 0x4}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003bc0)=""/18, 0x12}, {&(0x7f0000003c00)=""/153, 0x55}, {&(0x7f0000003cc0)=""/149, 0x95}, {&(0x7f0000003d80)=""/80, 0x50}, {&(0x7f0000003e00)=""/24, 0x18}, {&(0x7f0000003e40)=""/140, 0xffffffffffffff05}, {&(0x7f0000003f00)=""/133, 0x85}, {&(0x7f0000003fc0)=""/245, 0xf5}], 0x8, &(0x7f0000004140)=""/107, 0x6b}, 0xf25b}, {{&(0x7f00000041c0)=@vsock, 0x80, &(0x7f00000064c0)=[{&(0x7f0000004240)=""/250, 0xfa}, {&(0x7f0000004340)=""/4096, 0x1000}, {&(0x7f0000005340)=""/4096, 0x1000}, {&(0x7f0000006340)=""/175, 0xaf}, {&(0x7f0000006400)=""/153, 0x99}], 0x5, &(0x7f0000006540)=""/238, 0xee}, 0x4}, {{&(0x7f0000006640)=@isdn, 0x80, &(0x7f0000006780)=[{&(0x7f00000066c0)=""/148, 0x94}], 0x1, &(0x7f00000067c0)=""/201, 0xc9}, 0x4}, {{&(0x7f0000009040)=@ethernet, 0x80, &(0x7f0000008d40)=[{&(0x7f0000006940)=""/25, 0x19}, {&(0x7f0000006980)=""/47, 0x2f}, {&(0x7f00000069c0)=""/247, 0xf7}, {&(0x7f0000006ac0)=""/4096, 0x1000}, {&(0x7f0000007ac0)=""/235, 0xeb}, {&(0x7f0000007bc0)=""/166, 0xa6}, {&(0x7f0000007c80)=""/88, 0x58}, {&(0x7f0000007d00)=""/39, 0x27}, {&(0x7f0000007d40)=""/4096, 0x1000}], 0x9}, 0x7fff}], 0x7, 0x20, &(0x7f0000008fc0)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000300)={&(0x7f00000015c0)=ANY=[@ANYBLOB="030002a7", @ANYRES16=r4, @ANYBLOB="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"], 0x14c}, 0x1, 0x0, 0x0, 0x4050}, 0x0) r5 = socket$rxrpc(0x21, 0x2, 0x400000000000002) bind$rxrpc(r5, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) fsetxattr$security_capability(r0, &(0x7f0000001740)='security.capability\x00', &(0x7f0000001780)=@v2={0x2000000, [{0xffff, 0x5}, {0x7ff, 0x9}]}, 0x14, 0x3) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) io_submit(r6, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, r3, 0x0}]) sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000017c0)=0x9) accept4(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000100)=0x80, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x6, @rand_addr="3d1d56758c20e98e3430deb1f77e99e4", 0x5}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x2c) alarm(0x5) 03:45:44 executing program 2: mq_open(&(0x7f0000000b80)='@', 0x40, 0x10, &(0x7f0000000bc0)={0x6, 0x780, 0x101, 0x8a53, 0x3, 0x8, 0x8, 0x7ff}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000080}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r1, 0x311, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x4001) socket$inet_tcp(0x2, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000600)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffff6f03, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffffffffff81, 0x240000) recvmsg$kcm(r3, &(0x7f0000000b40)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000800)=""/161, 0xa1}, {&(0x7f00000008c0)=""/60, 0x3c}, {&(0x7f0000000900)=""/66, 0x42}, {&(0x7f0000000980)=""/43, 0x2b}, {&(0x7f00000009c0)=""/99, 0x63}], 0x5, &(0x7f0000000ac0)=""/124, 0x7c}, 0x2000) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000700)="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") ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f0000000140)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000000)={0x18, 0x0, {0x2, @broadcast, 'ip_vti0\x00'}}, 0x1e) connect$pppoe(r5, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'bond0\x00'}}, 0x1e) getsockopt$rose(r3, 0x104, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 981.547969] loop1: p1 < > p4 [ 981.563264] loop1: partition table partially beyond EOD, truncated [ 981.608947] loop1: p1 size 2 extends beyond EOD, truncated [ 981.688597] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:44 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:44 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 981.810588] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:45 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r1, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:45 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 982.127380] loop1: p1 < > p4 [ 982.133755] loop1: partition table partially beyond EOD, truncated [ 982.154776] loop1: p1 size 2 extends beyond EOD, truncated [ 982.205922] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:45 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x840, 0x0) write$P9_RREAD(r0, &(0x7f0000000240)={0x95, 0x75, 0x1, {0x8a, "83e51cf376cc2ed0a02d9da69ea4575a844cd3371e7fdb1c9eb7dbe846c5e7eae1cf55e8447efbb7c1563b423984c438e6d64466726d340e52a540023a285113e77e5456fdca7a6d49744d8be89727ff3dcbb055361e582e6e04869ded6b9650b0caded818b114c30e13a5687fe693359de44541f17c64192394542051e04943fbc55a937e9cd586e5ed"}}, 0x95) write$P9_RWSTAT(r0, &(0x7f00000013c0)={0x7, 0x7f, 0x1}, 0x7) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r5 = add_key$keyring(&(0x7f0000001400)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r6 = getuid() fstat(r4, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r5, r6, r7) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r8 = add_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="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", 0x1000, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000300)='\x00', r8) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 03:45:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000280)={0xfffffffffffff774, 0xfffffffffffffff9, 0x0, 0xfffffffffffffffc, 0xd, 0x9, 0x4, 0x40, 0x2, 0x8, 0x9, 0x1}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) r2 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x202000) r3 = openat(r2, &(0x7f00000002c0)='./file0\x00', 0x400, 0x68) connect$unix(r3, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000040)=0x5) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x141}, {r0, 0x2100}, {0xffffffffffffffff, 0x40}, {r0, 0x8001}, {r0, 0x3640}, {r3, 0x442}, {r0, 0x20}, {0xffffffffffffffff, 0x300}], 0x8, &(0x7f0000000140), &(0x7f0000000180)={0x1}, 0x8) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r3, &(0x7f0000000240)={0x2}) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x8, @tick=0x7, 0x6, {0x6, 0xb8}, 0x1, 0x1, 0x5}) [ 982.399428] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:45 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0h*\x02\x00', @ifru_flags}) 03:45:45 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 03:45:45 executing program 1: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffffa, 0x402) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x5cf, 0x8000, 0x10000, 0x79, 0x200}, &(0x7f0000000240)=0x14) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e22, 0x87f5, @local, 0x5}}}, 0x84) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1f9, 0x80000) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000100)=""/198) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:45 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 982.942937] IPVS: ftp: loaded support on port[0] = 21 03:45:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0xe4f) [ 983.048491] loop1: p1 < > p4 [ 983.052028] loop1: partition table partially beyond EOD, truncated [ 983.200670] loop1: p1 size 2 extends beyond EOD, truncated [ 983.296940] loop1: p4 start 1854537728 is beyond EOD, truncated [ 983.579679] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 983.580034] print_req_error: 45 callbacks suppressed [ 983.580044] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 983.644208] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 983.652147] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 983.658937] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 983.680885] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 983.687588] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:45:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00') mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0xd) 03:45:46 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x280000, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000040)={{0x7, @addr=0x7fffffff}, 0x8, 0x7, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:46 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 983.694513] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 983.701219] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 983.708079] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 983.714858] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:45:46 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r3, 0x0, r0, 0x0, 0x80010002, 0x2) 03:45:46 executing program 1: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:47 executing program 2: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 984.102707] loop1: p1 < > p4 [ 984.118092] loop1: partition table partially beyond EOD, truncated [ 984.162591] loop1: p1 size 2 extends beyond EOD, truncated [ 984.268974] loop1: p4 start 1854537728 is beyond EOD, truncated [ 984.387370] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 984.467521] buffer_io_error: 40 callbacks suppressed [ 984.467532] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.483535] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.491987] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.500905] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.509074] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.517038] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.526252] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.534605] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.542546] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.550945] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 984.614073] net_ratelimit: 21 callbacks suppressed [ 984.614080] protocol 88fb is buggy, dev hsr_slave_0 [ 984.624250] protocol 88fb is buggy, dev hsr_slave_1 [ 984.629381] protocol 88fb is buggy, dev hsr_slave_0 [ 984.634507] protocol 88fb is buggy, dev hsr_slave_1 03:45:48 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0i*\x02\x00', @ifru_flags}) 03:45:48 executing program 1: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x480c80) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) getsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000100)=""/232, &(0x7f0000000040)=0xe8) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:48 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:48 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x2, 0xff) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000100)={0xc027, 0x1}) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000240)=""/163) r4 = getgid() getgroups(0x6, &(0x7f0000000080)=[0xee01, 0xffffffffffffffff, 0xee01, 0x0, 0x0, 0xffffffffffffffff]) setregid(r4, r5) socket$inet(0x2, 0x5, 0x5) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 985.013219] IPVS: ftp: loaded support on port[0] = 21 03:45:48 executing program 2: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 985.191527] loop1: p1 < > p4 [ 985.246046] loop1: partition table partially beyond EOD, truncated 03:45:48 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000080)}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x80, 0x1, 0x2}, 0x5bb2}}, 0x18) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 985.349299] loop1: p1 size 2 extends beyond EOD, truncated [ 985.438712] loop1: p4 start 1854537728 is beyond EOD, truncated [ 985.553048] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:48 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 985.814104] protocol 88fb is buggy, dev hsr_slave_0 [ 985.814584] protocol 88fb is buggy, dev hsr_slave_0 [ 985.819241] protocol 88fb is buggy, dev hsr_slave_1 [ 985.824654] protocol 88fb is buggy, dev hsr_slave_1 [ 985.829399] protocol 88fb is buggy, dev hsr_slave_0 [ 985.839467] protocol 88fb is buggy, dev hsr_slave_1 03:45:49 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x10) msgrcv(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x75, 0x1, 0x3800) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0xfffffffffffffff4) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x101, 0x840) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000001c0)={0xfffffffffffffff8, 0xc1, 0x8}) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000009000)={0x18, 0x0, {0xffffffbfffffffff, @link_local, 'bond0\x00'}}, 0x1e) recvmmsg(r2, &(0x7f0000008e00)=[{{&(0x7f000000a240)=@caif=@rfm, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000240)=""/41, 0x1}, {&(0x7f0000009140)=""/198, 0xc6}, {&(0x7f0000000380)=""/212, 0xd4}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/67, 0x43}, {&(0x7f0000001500)=""/188, 0xbc}, {&(0x7f0000009240)=""/4096, 0x1000}], 0x8, &(0x7f0000002640)=""/47, 0x2f}}, {{&(0x7f0000002680)=@isdn, 0x80, &(0x7f0000002800)=[{&(0x7f0000002700)=""/197, 0xc5}, {&(0x7f0000002a00)=""/4096, 0xfffffffffffffc2e}], 0x2, &(0x7f0000002840)=""/194, 0xc2}, 0x4}, {{&(0x7f0000003a00)=@tipc=@name, 0x80, &(0x7f0000000080)=[{&(0x7f0000002940)=""/10, 0xa}], 0x1, &(0x7f0000003ac0)=""/95, 0x5f}, 0x4}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003bc0)=""/18, 0x12}, {&(0x7f0000003c00)=""/153, 0x55}, {&(0x7f0000003cc0)=""/149, 0x95}, {&(0x7f0000003d80)=""/80, 0x50}, {&(0x7f0000003e00)=""/24, 0x18}, {&(0x7f0000003e40)=""/140, 0xffffffffffffff05}, {&(0x7f0000003f00)=""/133, 0x85}, {&(0x7f0000003fc0)=""/245, 0xf5}], 0x8, &(0x7f0000004140)=""/107, 0x6b}, 0xf25b}, {{&(0x7f00000041c0)=@vsock, 0x80, &(0x7f00000064c0)=[{&(0x7f0000004240)=""/250, 0xfa}, {&(0x7f0000004340)=""/4096, 0x1000}, {&(0x7f0000005340)=""/4096, 0x1000}, {&(0x7f0000006340)=""/175, 0xaf}, {&(0x7f0000006400)=""/153, 0x99}], 0x5, &(0x7f0000006540)=""/238, 0xee}, 0x4}, {{&(0x7f0000006640)=@isdn, 0x80, &(0x7f0000006780)=[{&(0x7f00000066c0)=""/148, 0x94}], 0x1, &(0x7f00000067c0)=""/201, 0xc9}, 0x4}, {{&(0x7f0000009040)=@ethernet, 0x80, &(0x7f0000008d40)=[{&(0x7f0000006940)=""/25, 0x19}, {&(0x7f0000006980)=""/47, 0x2f}, {&(0x7f00000069c0)=""/247, 0xf7}, {&(0x7f0000006ac0)=""/4096, 0x1000}, {&(0x7f0000007ac0)=""/235, 0xeb}, {&(0x7f0000007bc0)=""/166, 0xa6}, {&(0x7f0000007c80)=""/88, 0x58}, {&(0x7f0000007d00)=""/39, 0x27}, {&(0x7f0000007d40)=""/4096, 0x1000}], 0x9}, 0x7fff}], 0x7, 0x20, &(0x7f0000008fc0)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000300)={&(0x7f00000015c0)=ANY=[@ANYBLOB="030002a7", @ANYRES16=r4, @ANYBLOB="050125bd7000ffdbdf2513000000840005000800010069620000240002000800010011000000080001000f000000080002000300000008000400530200001c00020008000300030000000800040017000000080003000000000014000200080001001500000008000200200f0000240002000800030007000000080001000d000000080001001f0000000800020003000000980005003c00020008000200000000000800030005000000080004000400000008000400140c00000800020001000000080003000100000008000200080000000c00020008000200020000004c000200080001000f00000008000400090000000800040002000000080001000f0000000800020020000000080003001be80000080001001c000000080004000000000008000400010000001c0004000c00010073797a30000000000c0007000800040007000000"], 0x14c}, 0x1, 0x0, 0x0, 0x4050}, 0x0) r5 = socket$rxrpc(0x21, 0x2, 0x400000000000002) bind$rxrpc(r5, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) fsetxattr$security_capability(r0, &(0x7f0000001740)='security.capability\x00', &(0x7f0000001780)=@v2={0x2000000, [{0xffff, 0x5}, {0x7ff, 0x9}]}, 0x14, 0x3) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) io_submit(r6, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, r3, 0x0}]) sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000017c0)=0x9) accept4(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000100)=0x80, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x6, @rand_addr="3d1d56758c20e98e3430deb1f77e99e4", 0x5}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x2c) alarm(0x5) 03:45:49 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x1f) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e24, @rand_addr=0x81}}, [0x65d, 0xa7, 0xfffffffffffffffd, 0x0, 0x1, 0x2, 0x9, 0x80000000, 0x4, 0x8, 0x4863, 0x0, 0x0, 0x2, 0x7]}, &(0x7f00000002c0)=0x100) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r4) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r5, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 986.215295] loop1: p1 < > p4 [ 986.231654] loop1: partition table partially beyond EOD, truncated [ 986.266228] loop1: p1 size 2 extends beyond EOD, truncated [ 986.351941] loop1: p4 start 1854537728 is beyond EOD, truncated [ 986.458742] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:49 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0j*\x02\x00', @ifru_flags}) 03:45:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000040)={&(0x7f0000000100)=""/102, 0x66}}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:49 executing program 0: lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getgid() setgroups(0x400002d5, &(0x7f00000004c0)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) fsetxattr$security_evm(r2, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="040c09f47e8bad07b284ce0b9dd4897ca4aa6f273a532d"], 0x16, 0x2) fgetxattr(r3, &(0x7f00000004c0)=@known='security.apparmor\x00', &(0x7f0000000500)=""/231, 0xe7) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r5}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440)={r6, 0x49, "b791f6601119b1339b7c0bf3f158d4433b174e99e8f30af591540950a4f888791e0ca8d2193e701963973d2bc952170b754acf8392a5f3e44ce5cd43d70de8d098202d785c3c24d047"}, &(0x7f00000003c0)=0x51) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:49 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:49 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) sync_file_range(r2, 0x1, 0x0, 0x7) bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0xfffffffffffffffc, @remote}, 0x2cd) splice(r1, 0x0, r0, 0x0, 0x10004, 0x3) [ 986.804733] IPVS: ftp: loaded support on port[0] = 21 03:45:49 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r3, 0x5414, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80, 0x6b77396a309852db) getsockopt$rose(r1, 0x104, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 987.022454] loop1: p1 < > p4 [ 987.041134] loop1: partition table partially beyond EOD, truncated 03:45:50 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x4eb0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={r4, 0x1, 0x3, [0x80000001, 0x100000000, 0x10000]}, 0xe) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000440)=0x1, 0xfffffef6) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000300)={{0x2, 0x1}, 0x48}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000280)={r4, 0x20}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) bind$rose(r0, &(0x7f0000000040)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x1, @default}, 0x1c) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 987.080221] loop1: p1 size 2 extends beyond EOD, truncated 03:45:50 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 987.187089] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80d, 0x80) bind$netrom(r1, &(0x7f00000006c0)={{0x3, @bcast}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)=[{0x100, 0x115, 0x4da, "1cfe9b10cb45206d00d7887168a7f36b99166e2f074d59c7419e0e414cd00685ffd276c8f5187346f354a62813beacaca14fd783cbdcac7e84d23c94f3761c9ea59ea39d23e09a30ff31c7331b2b5d4a4220370697910b96f8f94a70aaa6ed81a61b27fdb8479f198f9912a566b437a4d0fee85432cb6eccadcbd4b6f3eb4779d0b0b43bf2ac193587a9c3429bd538081c86edb163979b0598de70095f5674819827c87199ae30a27547eaa9dd27e455a5bbeee489a31dcf5e0a50b7140bc434af110ac4dcaaad97ac4167711f31e13c239ffc8e2d91b4261dadce6b2a71d79c194962e54a03ffeb3d39e7a2"}, {0xf0, 0x101, 0x5, "797215a7513dc3b1d4dd426e73155a86388e11a72c4fdde3a6922f45206b4fa7d07396e1207d0e73c5eec4fedbcdd821da174a9a416f1e76234a9bba4e1a3d59387a8a403fdadd96b07cdae39a45adc6f05ba7e7fb6f2a058b98252daf455a97651b380659f500e4f0df39673186a8d4ba9a6f630b743bdea7666510ae5ac25b09f5709b0c45a591aae3d51f6fc275ad69f895f8d701155f5c102b909f58e408ca8efd8783d9277d8988019ff78401e22a3e7dce74fd55695172f9175c75e3dcdafb6818ee3b35f7bdf366969d0a33eb8ec0481ce29a772228be61ad7fd226d2"}, {0x108, 0x109, 0x6, "ae67596c58c8e662d9dcc698f0fe9766c742b66d5c521ea86126f854544a68e7aeab6e78260c372f1dccf3221b5c338338c8ad83c336beb019f4a611704b69e6e70407a3fa9ed32013a8f8493539d5bf819a493689acf8764f60b56bf7479ee0682f96fd2cf7f6aa531d567c4b37208a0eac776657e2f8290b71bcf89db01722893335f9f466c8983da3aa6f00e86c7d064d696e7edf6f1659a8b1afdc7ac0dd7adc2d05c7cd094e5e9b99afcaf25232fabb59eb4b6ef4323b3429eb4e1db304fab3c9b480f31408fc5631a3ae3772c0a9bf0737898f97da2389ed781bead6106d9af6cfa315fd6b730e0d7fa372d9c7bcdcbac968"}, {0xe8, 0x119, 0xb3c, "729da02beb5c5992eec3785e63dfff7b9c19bc03f4cd7e414ae526ee6480308d90b34f1c8df594f04ccfd57c39a00da39d90f81c43db953a6e83082edf90e394438c892e71cd6bf18065c54351888d86e3923535aec4f0cee11322ba0dd5ef09e3809339899736af3702e51f6ba80788f6f005310c7169bffb6e943ffc0bfdcc7d208dc0dd1a863bb39d0bd68056a951ce54a0489c373c2f1fc4277d74ae5a4104293747a0b98761f3ea20ce529d0b78342b4842200683d99edb748c61a2cf0cdd559f99125f50d9222f981654a84b2928620e0f17592f40"}, {0xa0, 0x117, 0xffff, "e05d4a314a879461b4f9923c767d485191ff1ff3dc0f1a5324341dbd9cdc4b7d3e16e2f72d516c00252d3d011f6812f68434b6ea5719729da0dcec68001b939dbee61e0cfc10bfe27b58b6f329a4ec2933f868f0fc083b0b0b73f694743a3a9a2b07d19cde57501d8050074f4542c25eb00059f8ecce09919d254736f5df50ebfd1b119ecd947a042151749d31bf"}, {0x68, 0x107, 0x1, "57b2f66f1611683c8e35b31e89f1738044c67900e4c37f8d347be1c40e5740673ead59724f3e1bbd4ae42768fa6053342ff48b3bb2e3401709e7165ee1686d32063a0f32574039cb5aa1301a26abacebb17b84"}, {0x38, 0x13f, 0x4, "5774d7b096d3ea72af0e0f102d9f637f6f6e4f74a4dafb3670dc75d70c19a38210"}, {0x78, 0x10f, 0x10001, "1878f6c896ec33491d2b563cba1ed93137b4e81d92e9993cb24088bc20d4129d962708531c2d55c14295e988dacd5169238d2074903f3164dcfe0a87de7ee43ab3702f03a2132aa02a30dd671efe7243dfc2e3e3ee4a0d5aece6b04667f47d24c3d20e9c53df"}], 0x598}, 0xfffffffffffffffc}], 0x1, 0x0) [ 987.440268] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:50 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:50 executing program 5: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0xc256, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0) mq_notify(r2, &(0x7f0000000080)={0x0, 0x19, 0x4, @tid=r0}) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000100)) write$P9_RLINK(r2, &(0x7f0000000140)={0x7, 0x47, 0x1}, 0x7) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x80000000003, @link_local, 'bridge_slave_0\x00'}}, 0x14) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 987.843741] loop1: p1 < > p4 [ 987.856700] loop1: partition table partially beyond EOD, truncated [ 987.878546] loop1: p1 size 2 extends beyond EOD, truncated [ 987.928105] loop1: p4 start 1854537728 is beyond EOD, truncated [ 988.143575] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:51 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0k*\x02\x00', @ifru_flags}) 03:45:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x4000) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @random="e744e0e525de", 'lapb0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:51 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:51 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:51 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x5, 0xa}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x3, 0x4d3f, 0x202, 0x100000001, 0x9, 0x9, 0x20, 0xfb93, r4}, 0x20) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:51 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 988.476543] IPVS: ftp: loaded support on port[0] = 21 [ 988.608335] loop1: p1 < > p4 [ 988.642570] loop1: partition table partially beyond EOD, truncated [ 988.728335] loop1: p1 size 2 extends beyond EOD, truncated [ 988.866723] loop1: p4 start 1854537728 is beyond EOD, truncated [ 989.087766] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 989.095919] print_req_error: 56 callbacks suppressed [ 989.095931] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 989.164406] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 989.172050] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 989.178825] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 989.185469] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 989.192059] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 989.199390] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 989.206052] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:45:52 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:52 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 989.212623] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 989.219295] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:45:52 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x6, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0xb) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl$CAPI_INSTALLED(r1, 0x80024322) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000000000), 0x1d8, 0xfffffffffffffffc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x58101, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000000c0)={{0x4, 0x101}, 'port1\x00', 0x80, 0x100040, 0x9, 0xebb, 0x401, 0x1, 0xfffffffffffffffc, 0x0, 0x7}) 03:45:52 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0l*\x02\x00', @ifru_flags}) [ 989.562212] loop1: p1 < > p4 03:45:52 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000040)="0f22590f01c9650f01c866b9800000c00f326635000400000f30ea0b00240166b90d0400000f32baa100ecc782f692080067660f3a0876f1a866b8ceb4fc9d0f23d00f21f86635100000090f23f8", 0x4e}], 0x1, 0x4, &(0x7f0000000240)=[@efer={0x2, 0x2000}], 0x1) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1', "14f62638dda710d5905dcebe74d60247e88bda08366dd50df8404c3fe8c6f42eca07369ccdf2738c8beaba1ee7aeb0e0c6369c5a62d5443c5aacfdc0d3ed16efda99bdc8b9c4d79d"}, 0x4c) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 989.604190] loop1: partition table partially beyond EOD, truncated [ 989.667932] loop1: p1 size 2 extends beyond EOD, truncated [ 989.672366] IPVS: ftp: loaded support on port[0] = 21 [ 989.754950] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x20000000000, 0xc100) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400000, 0x0) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000140)={0xfffffffffffffff7, 0x18, 0x1}) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 989.947395] buffer_io_error: 50 callbacks suppressed [ 989.947406] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 989.962716] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 989.969443] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 989.976868] net_ratelimit: 18 callbacks suppressed [ 989.976876] protocol 88fb is buggy, dev hsr_slave_0 [ 989.976943] protocol 88fb is buggy, dev hsr_slave_1 [ 989.977050] protocol 88fb is buggy, dev hsr_slave_0 [ 989.977091] protocol 88fb is buggy, dev hsr_slave_1 [ 989.984015] protocol 88fb is buggy, dev hsr_slave_0 [ 989.988249] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 989.992263] protocol 88fb is buggy, dev hsr_slave_1 [ 989.997576] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 990.028472] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 990.036113] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:45:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x12240, 0x0) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x200) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80283) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:53 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 990.043815] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 990.052290] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 990.060257] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 990.068419] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:45:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) acct(&(0x7f0000000100)='./file0\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000080)={0x8, 0x8, 0x5, 0x1000100000000, 0x2}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000240)={0x5f92, {{0xa, 0x4e24, 0x8, @rand_addr="09fbb15fff2786b21fe924d0d288f2ed", 0x6}}, {{0xa, 0x4e24, 0x4a7, @mcast2, 0x8}}}, 0x108) close(r3) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000380)) 03:45:53 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 990.582060] loop1: p1 < > p4 [ 990.596107] loop1: partition table partially beyond EOD, truncated [ 990.619972] loop1: p1 size 2 extends beyond EOD, truncated 03:45:53 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) unshare(0x10000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 990.700714] loop1: p4 start 1854537728 is beyond EOD, truncated [ 990.774757] protocol 88fb is buggy, dev hsr_slave_0 [ 990.780515] protocol 88fb is buggy, dev hsr_slave_1 [ 990.856255] protocol 88fb is buggy, dev hsr_slave_0 [ 990.861843] protocol 88fb is buggy, dev hsr_slave_1 [ 990.881332] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:54 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:54 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffc}, 0x0, 0x6, r0, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) pipe(&(0x7f00000001c0)) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) flistxattr(r1, &(0x7f0000000140)=""/102, 0x66) sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r3 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000040)=0x1c, 0x80800) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000100)=0x2b, 0x4) 03:45:54 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0m*\x02\x00', @ifru_flags}) [ 991.245188] loop1: p1 < > p4 03:45:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:54 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 991.265488] loop1: partition table partially beyond EOD, truncated [ 991.290079] loop1: p1 size 2 extends beyond EOD, truncated [ 991.305292] IPVS: ftp: loaded support on port[0] = 21 [ 991.390159] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x0, {0xa, 0x4e21, 0x4, @empty, 0x9}}, 0x24362f706e5add27, &(0x7f0000000240), 0x1000000000000436, &(0x7f0000000100), 0x23e}, 0x4}], 0x166, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="012fbc8d07e0cdc318884dc144e3f681eb072a5d22e47eeb8df9b62489af962936854a8efece1ca5bab1f2766543f7744bbeb5a57cd35574fb4a9c73b3b48699fdc7c76c3fc7b8c6044075956b9af0e40a9236dffb5c3901bc1d57601af63be83dc39c404b0570aa18215fd0766a4d086ce0d994d736fa943b956ff73ada52ccac937f56a134e3df67b426544a18b90e172b5b7905dfc5ae6bb85908c1096b098110cbd45157b54533af0a12b5a2df2c7fccb19e2088be3a0151300193ef6096e1b2650aeeacfe0d77aed2c1971ec2405f069fd4d1f48878889a0c4e", 0xdc, 0xfffffffffffffffb) r2 = open(&(0x7f00000003c0)='./file0\x00', 0x20100, 0x2c) linkat(r2, &(0x7f0000000c40)='./file0\x00', r2, &(0x7f0000000c80)='./file0\x00', 0x1000) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000400)) r3 = add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="fb4820e03bb6a94d410ec5afa5709ebea88c226b07a32d0a3748f644b120c033128f960ffedba8fcf0f883831e7e6c60392884ead7b212c0", 0x38, 0xfffffffffffffffc) keyctl$link(0x8, r1, r3) r4 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2995, 0x100) ioctl$VIDIOC_SUBDEV_S_CROP(r4, 0xc038563c, &(0x7f0000000100)={0x0, 0x0, {0x8, 0x9, 0xe}}) [ 991.574059] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:54 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:54 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:45:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000000000), 0x1, 0x0) 03:45:54 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:55 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:45:55 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="60194cee346887049d47e1d7f84a65280f902827e23ff533d5bae274789a9193d43dc07db8d2ec09f5c624a72a584dfd09cae1066e97bf760dc6d204fe3f793defbc68d369768694844d443fe13274b504f2afd2e60111e8664b91b6", @ANYPTR64, @ANYBLOB="fe9c237ab963026ebc5173cec9e4087775ea01698b40f53b4807fc468c17af5a27d26060cca21af28ee377f76c8d0c34aae907c5950915c3bd9273b749df3239b8ec8d4ab327c85749a5ec90fc7923153592257caaaf5eb95eb5fdf03ed7a20e9b385a99d7b4875e11763ea4573f6338c92b06987ad3ab40ca12cb2385fd6dea47d9052139ec7c78c3f1ff5deb74cd2d7fc11297b8f3953d3fb6413399d96d35689a42b1c5b0f2dcbf372ee14eecf8a77f2a", @ANYRESDEC=0x0, @ANYRESOCT=r0, @ANYRES32=r0, @ANYRES64=0x0, @ANYRES16=r0], 0x14f) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x1) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:55 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x494200, 0x0) bind$tipc(r2, &(0x7f0000000480)=@id={0x1e, 0x3, 0x3, {0x4e20}}, 0x10) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1e0, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xdf}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8d}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x82f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x963}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf219}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x941}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) [ 992.203454] loop1: p1 < > p4 [ 992.224377] loop1: partition table partially beyond EOD, truncated [ 992.251929] loop1: p1 size 2 extends beyond EOD, truncated 03:45:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000bc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000c40)=""/205, 0xcd}], 0x1}, 0x2000) accept4$inet6(r1, 0x0, &(0x7f0000000000), 0x800) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000dc0)={0x8, [0xb90, 0x5, 0x3, 0x40, 0x0, 0x81, 0x1fc0000, 0x3]}, 0x14) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 992.327114] loop1: p4 start 1854537728 is beyond EOD, truncated [ 992.503931] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:55 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0n*\x02\x00', @ifru_flags}) 03:45:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x5, &(0x7f0000000200)='bdev\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/rnycast6\x00') write$FUSE_DIRENT(r2, &(0x7f0000000100)={0x68, 0x0, 0x8, [{0x3, 0x4a50, 0x6, 0x8, 'bond0\x00'}, {0x6, 0x4, 0x6, 0x1f, 'bond0\x00'}, {0x6, 0x6d5, 0x0, 0x9}]}, 0x68) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:55 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:45:55 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:55 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 992.858481] IPVS: ftp: loaded support on port[0] = 21 03:45:56 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:45:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x20800) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x16) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) r3 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, r3) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200080, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x2, 0x60f, 0x8}) [ 993.053568] loop1: p1 < > p4 03:45:56 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000240)=""/250) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x10001, [0x9e81, 0x8001, 0xfa0b, 0x7, 0x4, 0xffffffffffffffff, 0x1ff, 0x2c5c, 0x0, 0x0, 0x7ff, 0x5, 0x6, 0xd3c, 0x2, 0x160f, 0x1, 0xfffffffffffffffe, 0x10e, 0xfffffffffffffff9, 0x101, 0x5, 0xffff, 0xffff, 0x1000, 0x1, 0x0, 0x80, 0x10000, 0x2c9, 0x4, 0xd500000000000000, 0x6, 0x5, 0x9, 0x7, 0x2d, 0x8001, 0x1, 0x100, 0x3, 0x5, 0x8, 0x6, 0x9bee, 0x7, 0x4, 0x100000001], 0xf}) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 993.074831] loop1: partition table partially beyond EOD, truncated [ 993.097278] loop1: p1 size 2 extends beyond EOD, truncated 03:45:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x10ef, &(0x7f0000000100)=[{0xf0, 0x11f, 0xcbd, "3c586a1fff29bc0c1ace0d65c5a5f4f8fa0a8738ae23fd69a2156258cd76ef25b7dde1cbc6a8a3ab59ca158d00711cb77d2b830dd2efe80746e8f48bb2f1a7366c488e1a662c5e352af741c44a92b288c4956a2a7b2b941a0777c753cd298fbd89dafd9558c50c6c2ffa13b49fdab756da18594fa3a5843d76a1d64c864b8c3293a78fcde8e33fe8c2db989040fd3bdb4f79fda87db5df330aafed3751805b234c10657f582f3d2cb4cf308bcf589eebea5059243bc45d52a810d15cb5a15268fd56048a78eddf6f77b813da9f37d227b836e08609f9c823cd0be9bd"}, {0x78, 0x19c, 0x800, "f920104234acf5c8820e47fa05459c91605c8b8de85d78f580ad58e1e607b3dcffc1bc11f749ad5eccb1f0c207eb551c1b3b70c7f0c021db955cf4ce381bea8da0c87fb3cb9e3776d79ad4c7548357b8b8e8fe3b90fed38a605b0145530677a60718e7671c78"}, {0x98, 0x115, 0x9, "a5a078ebf51ce2199d4469e345412cfbf8f4a6845df583d8524be65f36dceae1aba9a2fbdeb4d05676fd16091958e2d9fe1a58b325fbe033a258e258726b8a9b4117bc6828c6e0e13c589406e7fdf1c0878d3af7b2f4da78b83ba159d3ca1eb3e79dc105c272bfb483c0e4386893df107b0b7da8bc417dd2d8cf5598ad77c66135dc0858041adf"}, {0xf0, 0x84, 0x9, "7059a18fafbff4f3647efd82784f99e8fb00d7346b553088d55469627ac643560aadb82ab4e3757f783b86a66e88546bb324fb5d958f761474b17c4555b006f80d229c54188690f56f9fa90cf16ca8e72dbff84c53a2e3e6d59321c3662a02b2714fbc034ef951dbec0054e11e637fbc3fffbfaa52fbf8b5596bd14b64ee0abc55b2063d90e914dd24257c170643abcf115a4d74fb4d1a3ab63417ac08da8844abc037a26cfa6c4d82fa0be9f9025f28c2f3a50aa4cc324d7c31724985d0a0b59282db06fada4fa577a6820f317c18f9384fe0072042b16452"}, {0x78, 0x11e, 0x7, "df7ac999cddd1087ddedd055b2515804f349731179689c3e7bec5f883dce6d485540f52fffd114cbcc2dbd09895d90f30f0be24004c9fd55b1b57c4eb72b8ba78d0a411bd82f79a427d719eb66dc096ecb074b72d67dc6ff944ef8cb23c7fe9b95"}, {0xe8, 0x3a, 0xffffffff, "03f6df78fb688756913d7ccb2fd8c60fe14ecf3a800098ac68e3da1cc8abc69413cddb49ecab72475b995836c826165bbb00bbd0a19ca956810a5c93534f4426d89023cd2e510bef7280194a4f222e396fdada003f998491125008df018b3141fc94bf73336bcef6aeddfb503d007a062fdada0d271dcd33ffc86ca546285746550b6ed023ddf4edeae089c7515e7811edded43efca31a04af391606d609c1e1f750f63015b0d04096e3e629e0bfc7cf6f0a057dffd47c16695cc00fa90688a1a0f936950f3621318794d8fbc8bdee4496c354"}], 0x450}}], 0x1, 0x0) 03:45:56 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 993.182517] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 03:45:56 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7", 0x4a, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 993.464831] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 993.873642] loop1: p1 < > p4 [ 993.887949] loop1: partition table partially beyond EOD, truncated [ 993.959192] loop1: p1 size 2 extends beyond EOD, truncated [ 994.021762] loop1: p4 start 1854537728 is beyond EOD, truncated [ 994.192319] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 994.192574] print_req_error: 45 callbacks suppressed [ 994.192585] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 994.219335] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 994.228819] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 994.235542] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 994.242147] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 994.248936] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 994.255600] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 994.262223] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 994.269036] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 994.275732] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:45:57 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0o*\x02\x00', @ifru_flags}) 03:45:57 executing program 2: pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000000a00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80410102}, 0xc, &(0x7f00000009c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="dc0400001a00100225bd7000fedbdf2500000000000000000000000000000000fe8000000000000000000000000000aa4e24ffe14e2400090a00800033000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) close(r2) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000b80)=@req={0x28, &(0x7f0000000b40)={'veth0\x00', @ifru_addrs=@rc={0x1f, {0x20, 0x6, 0x360, 0x8001, 0x7697, 0x3}, 0x70}}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000ac0)={0x0, &(0x7f0000000a80)=[{0x9, 0x8000}, {0x1, 0x81}, {0x5, 0x2}, {0x5, 0x2}, {0x4, 0x8}, {0x4, 0x5}]}) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x2d, 0x4, 0x8}, 0x4}}, 0x18) r5 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xfffffffffffffffa, 0xc9, 0x3ff, 0x0, 0x0, 0x9, 0xa0104, 0x4, 0x4, 0x401, 0x100, 0x1, 0x5, 0x3, 0x2, 0x10001, 0xffffffffffff0001, 0x2, 0x3, 0x8, 0x100400000000000, 0x1, 0x1, 0x0, 0x2, 0x101, 0xffffffffffffffff, 0xff, 0x8, 0x3, 0x9, 0x40000000000000, 0x7f, 0xeb9e, 0x7, 0x8, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x840, 0x7, 0x2c54, 0x5, 0x6, 0x8, 0x2}, 0x0, 0x10, r1, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0x2, {"b487804f13d61f07303034639c0ec176d1222a4e8914a4e20f786bd5c35013f4571c88728ccbf207317b8adc17cb77fe0ca0ebd92ae1906a599c"}}, {0x0, "c3b7344953d32e799e1da61ff9b4d162980fbcbfef713c341d403c06fe476884968c793293e5cdd28190415d5e5a605f6c5f546ab28cb310654a05b6b0a433e52b2247ad6638f60d70025a07e14b51fff0c7989de67fcc84229019375315dad2143c9e578dd53dfa54dfad2cf3b22796b2b7294b30ac8ccea60894fc5bc18b966fe938772477156102c08a49b3fa72e4f8f3c0764201e69f509bdaa93a05deebc9fd26896a5444255b8b39af7af3fae84d22120b6e768fecc6fb81bacf4704a29425d92d5315372197ee1fc7fabb"}}, &(0x7f0000001140)=""/4096, 0x124, 0x1000}, 0x20) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) fanotify_mark(r1, 0x6, 0x40000000, r5, &(0x7f0000000b00)='./file0/file0\x00') setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:57 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0xfff}, 0x1) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:57 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:57 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9c", 0x1, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 994.452592] IPVS: ftp: loaded support on port[0] = 21 [ 994.640833] loop1: p1 < > p4 [ 994.662086] loop1: partition table partially beyond EOD, truncated [ 994.697314] loop1: p1 size 2 extends beyond EOD, truncated 03:45:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) io_setup(0x6, &(0x7f0000000040)=0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x400000, 0x0) fdatasync(r1) io_cancel(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x5, r0, &(0x7f0000000240)="980d6d8446baf703be19b4bcbcba05ee842d091fd3269fd114d09451e5adf95b49ffba37ba181266f7900afc2d896b3b53cf8b17ddd138c7e51ee05f4e6da22ff3622b82fd523aa1cde02c40e889c21515aa4a3122f948dca546df4abb1a247b0031705edc98d809a40977e1b7269377cb75859a4ed5524c9f41b1561e165e3eda10c9e4e58ba2ec4545cf085c9ae650e878102359538cdf699160d5e2edfc15747543aba5ee5caf6438b3cc4780a2bd9995991a3060b5d2e4", 0xb9, 0xc124, 0x0, 0x0, r3}, &(0x7f0000000380)) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400002, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000100)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x8, 0xffff, 0xd69, 0x6, 0x4, 0xe1b5, "fd50b24459475148"}, 0x120) [ 994.852466] loop1: p4 start 1854537728 is beyond EOD, truncated [ 995.014077] net_ratelimit: 22 callbacks suppressed [ 995.014084] protocol 88fb is buggy, dev hsr_slave_0 [ 995.024353] protocol 88fb is buggy, dev hsr_slave_1 [ 995.029463] protocol 88fb is buggy, dev hsr_slave_0 [ 995.034577] protocol 88fb is buggy, dev hsr_slave_1 [ 995.185504] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:45:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f0000000000), 0x16b, &(0x7f0000000100)}}], 0x40000000000013e, 0x0) 03:45:58 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9c", 0x1, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:58 executing program 2: pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000000a00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80410102}, 0xc, &(0x7f00000009c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="dc0400001a00100225bd7000fedbdf2500000000000000000000000000000000fe8000000000000000000000000000aa4e24ffe14e2400090a00800033000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="fe800000000000000000000000000014000004d432000000ac1414aa000000000000000000000000ff7f000000000000aa03000000000000ffffff7f0000000040000000000000000200000000000000ff0300000000000009000000000000000700000000000000020000000000000008000000000000000300000000000000040000000000000001000000000000004000000027bd7000023500000200035a10000000000000000c000f0000000000000000004c011400736861332d3531320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e8070000e00000007e433fbd81433f342a10ea18618c62639344f45811e757fe64878676a16d3e6af009c9dc10f000d3ec3e9d3e121061c41063fdf85e7f44c21cc5571984c964e7f4da38840108512a930f1938d7d4f7c63bdfed61bcad57a12466a05a8ca93a918bd53366f3e721ef312408c8844b9fa541059707e8c5bc1b2babefa269cc542859688ec8552b29d6cc3423a13d591d83a65d8a86fb994c363f1c78ac23bdc525294275adeea221fb0944eb5ba303f1bf2d2bdd93392f916f4d1530985d9e94732e1ef08e3545e512074f932627b62331e8a64b7464c64bf6d6d635f3eb34cc77044ce6d7ab3783472282bbac7917b13642259d32bd57ac527100000000000000000000000001000004d31100000000000000f68da48e42a8c3a6fd39bf0eeb3e914a063500000300040001000000ffff000001000000ffffffff000000000000000000000000000004d33f00000002000000fe80000000000000000000000000000a0000000003030100090000000300000001000000ac1414aa000000000000000000000000000004d66c0000000a000000f5231719d0608aa97969d89ada8170370435000001019600020000000080000000010000fe80000000000000000000000000001c000004d33c0000000a00000000000000000000000000ffffffffffff0000000003030500030000000000000004000000fe8000000000000000000000000000aa000004d36c0000000a000000ff010000000000000000000000000001ff340000010306008100000003000000000000807f000001000000000000000000000000000004d6ff0000000a000000ac1414aa000000000000000000000000000000000303ff00e1b6000009000000da5b0000e0000001000000000000000000000000000004d6ff0000000a00000000000000000000000000000000000000ff34000007030200090000000400000009000000c8000200636263286165732d6165736e69290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e803000091aaf98c950f4e7cf216ec3153569edfbd13eb87258924a4cc0aff6c699accc7c5be73bc609ac8ae85c4ca55bee6ac65468450d0e2b6f1eff1c24fba51499ff4bb82ddcd7eddbf1607284fb875434e5b7ef0e11f7284aaf7763c6040bf2f711c0d78467e104e976740e3f59b239edaca6f6467d69098c9d6fe7fa67d6000000008000c002c06000000000000000000000000000000005bcb5ac396b43f0965b6d98c3817564def9829db23cf71a4c2c567fb765b422eb14d121f8e43aed658e10f286c02d212a6419a689387ee39007d84150241b62d338d6163bbf4905461bc4294cf31a64a911bd447a463621e77239365f016db607af6d08e140139"], 0x4dc}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) close(r2) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000b80)=@req={0x28, &(0x7f0000000b40)={'veth0\x00', @ifru_addrs=@rc={0x1f, {0x20, 0x6, 0x360, 0x8001, 0x7697, 0x3}, 0x70}}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000ac0)={0x0, &(0x7f0000000a80)=[{0x9, 0x8000}, {0x1, 0x81}, {0x5, 0x2}, {0x5, 0x2}, {0x4, 0x8}, {0x4, 0x5}]}) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x2d, 0x4, 0x8}, 0x4}}, 0x18) r5 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xfffffffffffffffa, 0xc9, 0x3ff, 0x0, 0x0, 0x9, 0xa0104, 0x4, 0x4, 0x401, 0x100, 0x1, 0x5, 0x3, 0x2, 0x10001, 0xffffffffffff0001, 0x2, 0x3, 0x8, 0x100400000000000, 0x1, 0x1, 0x0, 0x2, 0x101, 0xffffffffffffffff, 0xff, 0x8, 0x3, 0x9, 0x40000000000000, 0x7f, 0xeb9e, 0x7, 0x8, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x840, 0x7, 0x2c54, 0x5, 0x6, 0x8, 0x2}, 0x0, 0x10, r1, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0x2, {"b487804f13d61f07303034639c0ec176d1222a4e8914a4e20f786bd5c35013f4571c88728ccbf207317b8adc17cb77fe0ca0ebd92ae1906a599c"}}, {0x0, "c3b7344953d32e799e1da61ff9b4d162980fbcbfef713c341d403c06fe476884968c793293e5cdd28190415d5e5a605f6c5f546ab28cb310654a05b6b0a433e52b2247ad6638f60d70025a07e14b51fff0c7989de67fcc84229019375315dad2143c9e578dd53dfa54dfad2cf3b22796b2b7294b30ac8ccea60894fc5bc18b966fe938772477156102c08a49b3fa72e4f8f3c0764201e69f509bdaa93a05deebc9fd26896a5444255b8b39af7af3fae84d22120b6e768fecc6fb81bacf4704a29425d92d5315372197ee1fc7fabb"}}, &(0x7f0000001140)=""/4096, 0x124, 0x1000}, 0x20) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) fanotify_mark(r1, 0x6, 0x40000000, r5, &(0x7f0000000b00)='./file0/file0\x00') setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:58 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:45:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x2100, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) fchmod(r2, 0x4) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="9d63463b92690fa8f02141a7e6aa12a04b0262a226cdf979ac3035f20be0a74617639d233cc7176522c2b581ec6e37901126924c23", 0x35, 0xfff}, {&(0x7f0000000200)="eff2a40568b5c819a09efe0e6853754b73381666546fefc099247c6f8916250596d8cca5ebcee74d8d3ac2b04dee1397e87683e633ab84ab65dc2d8234ab2df6a210de44f700817f1cb6ac05d9a3044214fb03f01ee97b5c0497a81e055cae731591ef4c3212ea0c", 0x68, 0x1f}, {&(0x7f0000000280)="e690e1b0830769a7a1e294dfc692cdc85e59f1cdb624d000c7ea6678010385a43f16a52d043358b6a9d0ba835533e81ca1d91d68fb2fe7e4cb4e839217f8a3d295992e18121f3e7ad07e5182aea9c1672abf3223597c359640b6492637683fbc942e058a74dfb6e969cd2335afb1eae8b430049b6f10aa13b370afef4fa6c89c614b06e8ca2c5b9a3e05f3d686153d53e58a6c6f91065bc97d5e2d70f2dcf195795de0583840dff771d7c5f48734d49ae0db4559b69a71beec5e1e3d694265ed1f9ae2ba95", 0xc5}, {&(0x7f0000000380)="93ce5e53039afee7651be287feb437273e220eadc9a4550f6d861bcdf208f9a41b555a612a5a42ca2fb25f42903994634b2bb7d0b0774034ab220d65c529f7960f1d2c10b2e3a65625c7b20e96fd91f9187a5e1549", 0x55, 0x5}], 0x201010, 0x0) r3 = getpgrp(0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000580)={0x3, 0x81, r3, 0x0, r4, 0x0, 0x40, 0xffffffffffffff07}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 995.801898] loop1: p1 < > p4 [ 995.825135] loop1: partition table partially beyond EOD, truncated [ 995.889455] IPVS: ftp: loaded support on port[0] = 21 [ 995.933823] loop1: p1 size 2 extends beyond EOD, truncated [ 996.032544] loop1: p4 start 1854537728 is beyond EOD, truncated 03:45:59 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0p*\x02\x00', @ifru_flags}) 03:45:59 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "2a31615a7ab341d252c9c6a12dfb"}, 0xf, 0x90ab6629ff3709b) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:45:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000140)) r2 = semget(0x3, 0x4, 0x408) r3 = fcntl$dupfd(r0, 0x406, r1) ioctl$VT_RELDISP(r3, 0x5605) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) semctl$GETNCNT(r2, 0x4, 0xe, &(0x7f0000000000)=""/78) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000100)}}], 0x1, 0x0) [ 996.214045] protocol 88fb is buggy, dev hsr_slave_0 [ 996.214080] protocol 88fb is buggy, dev hsr_slave_1 [ 996.219144] protocol 88fb is buggy, dev hsr_slave_1 [ 996.229355] protocol 88fb is buggy, dev hsr_slave_0 [ 996.234470] protocol 88fb is buggy, dev hsr_slave_1 [ 996.297768] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 996.441021] buffer_io_error: 40 callbacks suppressed [ 996.441031] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 996.447811] IPVS: ftp: loaded support on port[0] = 21 [ 996.456180] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 996.466509] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 996.474259] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 996.483107] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:45:59 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9c", 0x1, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:45:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x105100, 0x100) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000140)=""/103) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:45:59 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 996.490887] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 996.571732] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 996.580475] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 996.588379] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 996.595962] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:45:59 executing program 2: [ 996.904453] loop1: p1 < > p4 [ 996.926535] loop1: partition table partially beyond EOD, truncated 03:46:00 executing program 2: [ 997.006294] loop1: p1 size 2 extends beyond EOD, truncated [ 997.014863] protocol 88fb is buggy, dev hsr_slave_0 03:46:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000240)={0x1f, 0x4, [0x400000000]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000200)={0x8001, 0x452f1233, 0x4, 0x1, 0x17, 0x11, 0x9, 0x1f, 0x7ff, 0x6, 0x20, 0xfffffffffffffe00}) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0x7}}, 0x10) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000180)={0x3, 0x0, [{0x80000007, 0x69fc, 0x4, 0x0, 0x354}, {0x80000001, 0xeb43, 0x1, 0xfffffffffffffffe, 0x3ff}, {0x80000001, 0x839, 0x1, 0x7b, 0x7}]}) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 997.056164] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:00 executing program 2: [ 997.199945] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={0x0, 0xff47, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) dup2(r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffff8001, 0xa000) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x18) connect$pppoe(r4, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0xfffffffffffffff1) 03:46:00 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 997.618879] loop1: p1 < > p4 [ 997.634466] loop1: partition table partially beyond EOD, truncated [ 997.661571] loop1: p1 size 2 extends beyond EOD, truncated [ 997.728505] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:00 executing program 2: 03:46:00 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) r4 = getpid() ptrace$poke(0x5, r4, &(0x7f0000000040), 0x42e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) fstatfs(r0, &(0x7f0000000080)=""/34) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @link_local, 'bond0\x00'}}, 0xffffffffffffff84) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:46:00 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0q*\x02\x00', @ifru_flags}) 03:46:00 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 997.819776] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:01 executing program 2: 03:46:01 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) getpeername$packet(r0, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000010c0)=0x14) bind$can_raw(r1, &(0x7f0000001100)={0x1d, r2}, 0x10) r3 = socket$pppoe(0x18, 0x1, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) write$binfmt_elf64(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x73a) write$P9_RWALK(r1, &(0x7f0000000000)={0x16, 0x6f, 0x1, {0x1, [{0x80, 0x0, 0x7}]}}, 0x16) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 998.015885] IPVS: ftp: loaded support on port[0] = 21 03:46:01 executing program 2: 03:46:01 executing program 2: 03:46:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x240400, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040)) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000180)={{0x1, 0x9, 0x0, 0x4, 0x4, 0x3}, 0x3ff}) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffffff8, 0x8400) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x4, @remote, 'ip6erspan0\x00'}}) [ 998.459237] loop1: p1 < > p4 [ 998.472439] loop1: partition table partially beyond EOD, truncated 03:46:01 executing program 2: 03:46:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200001, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10000, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000100)={0x6, {{0x2, 0x4e21, @rand_addr=0x56491aaf}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) [ 998.500980] loop1: p1 size 2 extends beyond EOD, truncated [ 998.583588] loop1: p4 start 1854537728 is beyond EOD, truncated [ 998.804437] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:02 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000100)={r5, 0x6d, 0x3, 0x1, 0x36, 0xffff}, 0x14) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:02 executing program 2: 03:46:02 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0r*\x02\x00', @ifru_flags}) 03:46:02 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:46:02 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:02 executing program 2: 03:46:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0xfffffffffffffc75) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 999.410860] IPVS: ftp: loaded support on port[0] = 21 [ 999.456070] loop1: p1 < > p4 [ 999.459552] loop1: partition table partially beyond EOD, truncated 03:46:02 executing program 2: [ 999.500083] loop1: p1 size 2 extends beyond EOD, truncated [ 999.600606] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:02 executing program 2: 03:46:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) bind$unix(r1, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 999.843525] print_req_error: 45 callbacks suppressed [ 999.843536] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 999.852251] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 999.867925] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 999.878348] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 999.885865] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 999.893117] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 999.901097] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 999.908569] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 999.925547] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 999.932981] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:46:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x240400, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040)) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000180)={{0x1, 0x9, 0x0, 0x4, 0x4, 0x3}, 0x3ff}) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffffff8, 0x8400) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x4, @remote, 'ip6erspan0\x00'}}) 03:46:03 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 999.942384] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1000.264804] loop1: p1 < > p4 [ 1000.286652] loop1: partition table partially beyond EOD, truncated [ 1000.342305] loop1: p1 size 2 extends beyond EOD, truncated [ 1000.374046] net_ratelimit: 17 callbacks suppressed [ 1000.374053] protocol 88fb is buggy, dev hsr_slave_0 [ 1000.379104] protocol 88fb is buggy, dev hsr_slave_1 [ 1000.384605] protocol 88fb is buggy, dev hsr_slave_0 [ 1000.389340] protocol 88fb is buggy, dev hsr_slave_0 [ 1000.394696] protocol 88fb is buggy, dev hsr_slave_1 [ 1000.399387] protocol 88fb is buggy, dev hsr_slave_1 [ 1000.452635] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:03 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x4}}, 0x30) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:03 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "2a31615a7ab341d252c9c6a12dfb"}, 0xf, 0x90ab6629ff3709b) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1000.618753] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:04 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0s*\x02\x00', @ifru_flags}) 03:46:04 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:46:04 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be", 0x14, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) bind$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x1, 0x0, 0x7, 0x0, 0x8132, "a9b0c1f5e7ad1b3231001aaaf784ef627a8433c0285b45326c9f712a772a8377daab6712604eec93ef30b7658d999abbb68d48802460c0d0d4d88d0f4c21ad", 0x1b}, 0x60) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x9}}, [0x9, 0x5, 0x8, 0x8, 0x0, 0x80000000, 0x5, 0x6, 0xfc5, 0x2, 0x7352985d, 0x4, 0x2, 0x40f, 0x101]}, &(0x7f0000000000)=0x100) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e24, 0x3ff, @loopback, 0x5}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e20, 0x4d, @loopback, 0x100000001}, @in6={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e20, @remote}], 0xb4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={r3, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e20, 0x68fd, @local, 0x9}}, 0x6, 0x4, 0x5, 0x0, 0x1}, 0x98) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000300)=""/189) syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x88000) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) 03:46:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x2100, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) fchmod(r2, 0x4) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="9d63463b92690fa8f02141a7e6aa12a04b0262a226cdf979ac3035f20be0a74617639d233cc7176522c2b581ec6e37901126924c23", 0x35, 0xfff}, {&(0x7f0000000200)="eff2a40568b5c819a09efe0e6853754b73381666546fefc099247c6f8916250596d8cca5ebcee74d8d3ac2b04dee1397e87683e633ab84ab65dc2d8234ab2df6a210de44f700817f1cb6ac05d9a3044214fb03f01ee97b5c0497a81e055cae731591ef4c3212ea0c", 0x68, 0x1f}, {&(0x7f0000000280)="e690e1b0830769a7a1e294dfc692cdc85e59f1cdb624d000c7ea6678010385a43f16a52d043358b6a9d0ba835533e81ca1d91d68fb2fe7e4cb4e839217f8a3d295992e18121f3e7ad07e5182aea9c1672abf3223597c359640b6492637683fbc942e058a74dfb6e969cd2335afb1eae8b430049b6f10aa13b370afef4fa6c89c614b06e8ca2c5b9a3e05f3d686153d53e58a6c6f91065bc97d5e2d70f2dcf195795de0583840dff771d7c5f48734d49ae0db4559b69a71beec5e1e3d694265ed1f9ae2ba95", 0xc5}, {&(0x7f0000000380)="93ce5e53039afee7651be287feb437273e220eadc9a4550f6d861bcdf208f9a41b555a612a5a42ca2fb25f42903994634b2bb7d0b0774034ab220d65c529f7960f1d2c10b2e3a65625c7b20e96fd91f9187a5e1549", 0x55, 0x5}], 0x201010, 0x0) r3 = getpgrp(0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000580)={0x3, 0x81, r3, 0x0, r4, 0x0, 0x40, 0xffffffffffffff07}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0) [ 1001.143049] IPVS: ftp: loaded support on port[0] = 21 [ 1001.174047] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.179229] protocol 88fb is buggy, dev hsr_slave_1 [ 1001.254052] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.259239] protocol 88fb is buggy, dev hsr_slave_1 [ 1001.299510] loop1: p1 < > p4 [ 1001.312645] loop1: partition table partially beyond EOD, truncated [ 1001.340873] loop1: p1 size 2 extends beyond EOD, truncated 03:46:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f0000000000), 0x16b, &(0x7f0000000100)}}], 0x40000000000013e, 0x0) [ 1001.473598] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:04 executing program 5: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0X*\x02\x00', @ifru_flags}) [ 1001.714921] buffer_io_error: 50 callbacks suppressed [ 1001.714931] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1001.728044] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1001.736338] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1001.743836] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1001.751546] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:04 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000240)={0x2, {{0x2, 0x4e23, @multicast2}}, 0x1, 0x3, [{{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e21, @rand_addr=0x7}}]}, 0x210) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:04 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1001.759070] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1001.766595] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1001.774122] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1001.786531] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1001.795079] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1001.803236] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:04 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "2a31615a7ab341d252c9c6a12dfb"}, 0xf, 0x90ab6629ff3709b) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1001.861259] IPVS: ftp: loaded support on port[0] = 21 03:46:05 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) socket$inet(0x2, 0x3, 0x7f) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 1002.391810] loop1: p1 < > p4 [ 1002.462594] loop1: partition table partially beyond EOD, truncated [ 1002.529718] loop1: p1 size 2 extends beyond EOD, truncated 03:46:05 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0t*\x02\x00', @ifru_flags}) [ 1002.610841] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1002.738992] IPVS: ftp: loaded support on port[0] = 21 [ 1002.758841] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:05 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r1, &(0x7f00000002c0)={0x1f, 0x4, {0x7fff, 0xffffffff, 0x5, 0x3, 0x101, 0x4}, 0x6, 0xfffffffffffffc01}, 0xe) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req={0xff, 0x3, 0x3, 0x2}, 0x10) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000240)={0xffffffff, 0xf, 0x4, 0x30000, {r4, r5/1000+10000}, {0x4, 0xd, 0x8, 0x7, 0x10000, 0x8, "12058d5a"}, 0x3, 0x1f8de5fc2e988418, @planes=&(0x7f0000000080)={0x7fffffff, 0x6, @mem_offset=0x6, 0x2}, 0x4}) fadvise64(r2, 0x0, 0x200, 0x7) 03:46:05 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:06 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 1003.321806] loop1: p1 < > p4 03:46:06 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1003.358761] loop1: partition table partially beyond EOD, truncated [ 1003.430761] loop1: p1 size 2 extends beyond EOD, truncated [ 1003.549077] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:06 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:06 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1003.757783] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:06 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1003.838664] hfs: can't find a HFS filesystem on dev loop5 [ 1004.033754] loop5: p1 < > p4 03:46:07 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:07 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x5, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) sendmsg$rds(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/73, 0x49}, {&(0x7f0000000240)=""/169, 0xa9}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000300)=""/37, 0x25}, {&(0x7f0000000340)=""/89, 0x59}, {&(0x7f00000003c0)=""/166, 0xa6}], 0x6, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="fe93476808000028b4358b07024f2c126663871c2a1f46904ae7ff224938a9da9905fe6f03b495f04d0f675718beb17ce0b149118b304ea7f4417d114ac18b"], @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f7ffffffffffffff8dcd0000000000000600000000000000090000000000000032000000000000000400000000000000"], 0x58, 0x8011}, 0x8800) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000500)={0xff}, 0x1) syz_init_net_socket$netrom(0x6, 0x5, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000640)=0xeedc) [ 1004.071006] loop5: partition table partially beyond EOD, truncated 03:46:07 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 1004.131998] loop5: p1 size 2 extends beyond EOD, truncated 03:46:07 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0u*\x02\x00', @ifru_flags}) [ 1004.210866] loop1: p1 < > p4 [ 1004.223510] loop1: partition table partially beyond EOD, truncated [ 1004.245079] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1004.301401] loop1: p1 size 2 extends beyond EOD, truncated 03:46:07 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1004.383451] IPVS: ftp: loaded support on port[0] = 21 [ 1004.399616] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1004.441779] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1004.615248] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:07 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:07 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:07 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f", 0xb, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1004.817917] hfs: can't find a HFS filesystem on dev loop5 03:46:08 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1005.107684] Dev loop5: unable to read RDB block 1 [ 1005.111250] loop1: p1 < > p4 [ 1005.143606] loop1: partition table partially beyond EOD, truncated [ 1005.154959] loop5: unable to read partition table [ 1005.161543] loop5: partition table beyond EOD, truncated [ 1005.183672] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:46:08 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 1005.212228] loop1: p1 size 2 extends beyond EOD, truncated [ 1005.291355] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1005.322843] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:08 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="9a5b0ef0eb4152ba6ef6f5ef70a6cd093c3d79ca9df20a6bff78e538f9434424b2776ab6c4e75459d04c307ad6bc6e44aebe3ff89a79f86ea13179d61530c45f4effe8f9ac5aee27a88638f41f3fe084478e0614c6846e6e2ea9bc227b872b319d00cb2665aaddaa57835993064c239907af7112a93d188955cdf5a92cbeca5a2819d4694cb301f1ef60df830e239787aac353311dfbe27a50d7195c7c50c6b71a376639fc507d6852d953f4d45456876806d1fafffab4afe12f8d47d874c458a784e284d3bd22f9ca4c49ba3e3ff44158e44e80e8bb61467238961dc22175e424b17835d27b2f7ce3b761755a2d1107", @ANYRES16=r0, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESDEC=r0], 0x4240a42f) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0xe6, 0x200, 0xb07, 0x2, r4}, 0x10) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:08 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:08 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x5, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) sendmsg$rds(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/73, 0x49}, {&(0x7f0000000240)=""/169, 0xa9}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000300)=""/37, 0x25}, {&(0x7f0000000340)=""/89, 0x59}, {&(0x7f00000003c0)=""/166, 0xa6}], 0x6, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="fe93476808000028b4358b07024f2c126663871c2a1f46904ae7ff224938a9da9905fe6f03b495f04d0f675718beb17ce0b149118b304ea7f4417d114ac18b"], @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f7ffffffffffffff8dcd0000000000000600000000000000090000000000000032000000000000000400000000000000"], 0x58, 0x8011}, 0x8800) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000500)={0xff}, 0x1) syz_init_net_socket$netrom(0x6, 0x5, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000640)=0xeedc) [ 1005.639932] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:08 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f", 0xb, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:09 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1006.043695] loop1: p1 < > p4 [ 1006.066483] loop1: partition table partially beyond EOD, truncated [ 1006.089917] loop1: p1 size 2 extends beyond EOD, truncated [ 1006.198677] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1006.342920] print_req_error: 56 callbacks suppressed [ 1006.342931] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 1006.348289] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1006.361718] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1006.368341] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1006.375743] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1006.382284] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1006.388861] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1006.410640] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1006.417747] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1006.425764] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1006.432844] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:46:09 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0v*\x02\x00', @ifru_flags}) 03:46:09 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:09 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:46:09 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:09 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x3, 0x2, [0xffffffffffffff80, 0x7f]}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000240)={r5, @in={{0x2, 0x4e21, @local}}, 0x6, 0x2}, &(0x7f00000000c0)=0x90) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1006.704490] hfs: can't find a HFS filesystem on dev loop5 [ 1006.789362] IPVS: ftp: loaded support on port[0] = 21 03:46:09 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1006.931260] loop1: p1 < > p4 [ 1006.939033] Dev loop5: unable to read RDB block 1 [ 1006.946155] loop1: partition table partially beyond EOD, truncated [ 1006.960179] loop5: unable to read partition table [ 1006.976563] loop5: partition table beyond EOD, truncated [ 1006.982928] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1007.012011] loop1: p1 size 2 extends beyond EOD, truncated [ 1007.112475] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1007.262374] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:10 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:10 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1007.375585] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1007.414061] net_ratelimit: 20 callbacks suppressed [ 1007.414069] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.424228] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.494536] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.499719] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.504894] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.509959] protocol 88fb is buggy, dev hsr_slave_1 03:46:10 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:10 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x4000000000000000) 03:46:10 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) [ 1007.880315] loop1: p1 < > p4 [ 1007.895009] loop1: partition table partially beyond EOD, truncated [ 1007.937004] loop1: p1 size 2 extends beyond EOD, truncated [ 1007.997149] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1008.180914] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1008.183909] buffer_io_error: 40 callbacks suppressed [ 1008.183919] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.201049] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.210138] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.218378] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.226259] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.235170] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.244157] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.253021] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.261684] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1008.269172] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:11 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0w*\x02\x00', @ifru_flags}) 03:46:11 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x900000000000000) 03:46:11 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000080)) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r0, 0x0, 0x10002, 0x800000000000) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4001) 03:46:11 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1008.456126] IPVS: ftp: loaded support on port[0] = 21 [ 1008.543890] loop1: p1 < > p4 [ 1008.551917] loop1: partition table partially beyond EOD, truncated [ 1008.571928] loop1: p1 size 2 extends beyond EOD, truncated [ 1008.622265] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1008.694033] protocol 88fb is buggy, dev hsr_slave_0 [ 1008.694427] protocol 88fb is buggy, dev hsr_slave_0 [ 1008.699145] protocol 88fb is buggy, dev hsr_slave_1 [ 1008.704522] protocol 88fb is buggy, dev hsr_slave_1 03:46:11 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) [ 1008.893709] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:12 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:12 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x4000000000000000) 03:46:12 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r2 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r3, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r4, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:12 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1009.366025] loop1: p1 < > p4 [ 1009.407451] loop1: partition table partially beyond EOD, truncated [ 1009.448577] hfs: can't find a HFS filesystem on dev loop5 [ 1009.485077] loop1: p1 size 2 extends beyond EOD, truncated [ 1009.531119] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:12 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0x*\x02\x00', @ifru_flags}) [ 1009.726772] loop5: p1 < > p4 03:46:12 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) [ 1009.748183] loop5: partition table partially beyond EOD, truncated [ 1009.753875] IPVS: ftp: loaded support on port[0] = 21 [ 1009.773499] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:12 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1009.829230] loop5: p1 size 2 extends beyond EOD, truncated [ 1009.932156] loop5: p4 start 1854537728 is beyond EOD, truncated 03:46:13 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x500000000000000) [ 1010.061435] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1010.171237] loop1: p1 < > p4 [ 1010.212995] loop1: partition table partially beyond EOD, truncated [ 1010.249879] loop1: p1 size 2 extends beyond EOD, truncated 03:46:13 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x200000000000000) [ 1010.385493] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1010.571379] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:13 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:13 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000040)={[{0x4, 0xfffffffffffffc00, 0x9, 0x2, 0x100000001, 0xa00000, 0x8, 0x8, 0x3, 0x6, 0x0, 0x4, 0x5}, {0x6, 0x8, 0x2, 0x7, 0x4e, 0x3ff, 0x1, 0x7, 0x7fffffff, 0xfff, 0x7, 0x8be3, 0x100000000}, {0x952, 0x400, 0x4, 0x8001, 0xfffffffffffff800, 0x8, 0x4, 0x2, 0xfff, 0x0, 0x5ce3, 0x80, 0x20}], 0x4}) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:13 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:46:14 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1010.969618] loop1: p1 < > p4 [ 1010.985329] loop1: partition table partially beyond EOD, truncated [ 1011.001084] loop1: p1 size 2 extends beyond EOD, truncated [ 1011.101542] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:14 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0y*\x02\x00', @ifru_flags}) 03:46:14 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1011.310958] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1011.319531] IPVS: ftp: loaded support on port[0] = 21 03:46:14 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:14 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:14 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0xffffff97) 03:46:14 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:14 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:14 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) [ 1011.888135] loop1: p1 < > p4 [ 1011.916629] loop1: partition table partially beyond EOD, truncated [ 1011.962428] loop1: p1 size 2 extends beyond EOD, truncated [ 1012.004940] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:15 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1012.132213] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1012.218149] print_req_error: 67 callbacks suppressed [ 1012.218161] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 1012.289255] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1012.297337] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1012.304408] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1012.311408] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1012.319462] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1012.326502] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:46:15 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1012.334405] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1012.341355] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1012.348640] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:46:15 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1012.399593] IPVS: ftp: loaded support on port[0] = 21 [ 1012.612169] loop1: p1 < > p4 [ 1012.630417] loop1: partition table partially beyond EOD, truncated [ 1012.697792] loop1: p1 size 2 extends beyond EOD, truncated [ 1012.755167] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:15 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1012.854080] net_ratelimit: 20 callbacks suppressed [ 1012.854088] protocol 88fb is buggy, dev hsr_slave_0 [ 1012.864188] protocol 88fb is buggy, dev hsr_slave_1 [ 1012.864375] protocol 88fb is buggy, dev hsr_slave_0 [ 1012.869281] protocol 88fb is buggy, dev hsr_slave_0 [ 1012.874683] protocol 88fb is buggy, dev hsr_slave_1 [ 1012.879343] protocol 88fb is buggy, dev hsr_slave_1 [ 1012.961704] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:16 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0z*\x02\x00', @ifru_flags}) 03:46:16 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x0, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:16 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 03:46:16 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:16 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:16 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1013.505933] hfs: can't find a HFS filesystem on dev loop5 [ 1013.512971] loop1: p1 < > p4 [ 1013.534225] loop1: partition table partially beyond EOD, truncated [ 1013.579482] IPVS: ftp: loaded support on port[0] = 21 [ 1013.601960] loop1: p1 size 2 extends beyond EOD, truncated 03:46:16 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1013.654069] protocol 88fb is buggy, dev hsr_slave_0 [ 1013.655124] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1013.659241] protocol 88fb is buggy, dev hsr_slave_1 03:46:16 executing program 5: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x02N\x00', @ifru_flags}) [ 1013.734053] protocol 88fb is buggy, dev hsr_slave_0 [ 1013.739218] protocol 88fb is buggy, dev hsr_slave_1 [ 1013.749052] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1013.832644] buffer_io_error: 70 callbacks suppressed [ 1013.832654] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1013.839403] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1013.854616] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1013.862440] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1013.871261] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:17 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1013.879114] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1013.887640] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1013.895713] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1013.904499] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1013.912312] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:17 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1014.019472] IPVS: ftp: loaded support on port[0] = 21 [ 1014.129386] loop1: p1 < > p4 [ 1014.133098] loop1: partition table partially beyond EOD, truncated [ 1014.176983] loop1: p1 size 2 extends beyond EOD, [ 1014.176992] truncated [ 1014.191787] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:17 executing program 2: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00@\x00', @ifru_flags}) 03:46:17 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) [ 1014.263410] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1014.386842] IPVS: ftp: loaded support on port[0] = 21 03:46:17 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0{*\x02\x00', @ifru_flags}) 03:46:17 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:17 executing program 0: openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 1014.888356] loop1: p1 < > p4 [ 1014.908441] loop1: partition table partially beyond EOD, truncated [ 1014.928816] loop1: p1 size 2 extends beyond EOD, truncated 03:46:18 executing program 5: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1014.930498] IPVS: ftp: loaded support on port[0] = 21 [ 1014.948092] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:18 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @mss={0x2, 0x9}, @mss={0x2, 0x8}, @mss={0x2, 0x3ff}, @mss, @mss={0x2, 0x3ff}, @sack_perm, @sack_perm, @window={0x3, 0xffff, 0x4}, @window={0x3, 0x3, 0x517bad62}], 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) flock(r3, 0x8) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1015.015495] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:18 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1015.076869] loop5: p1 < > p4 [ 1015.094104] loop5: partition table partially beyond EOD, truncated [ 1015.103226] loop5: p1 size 2 extends beyond EOD, truncated 03:46:18 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) [ 1015.175215] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1015.226353] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1015.365266] loop1: p1 < > p4 [ 1015.382617] loop1: partition table partially beyond EOD, truncated 03:46:18 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x0, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1015.424774] loop1: p1 size 2 extends beyond EOD, truncated [ 1015.449400] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1015.525489] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1015.597934] hfs: can't find a HFS filesystem on dev loop5 03:46:18 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aae", 0x91, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:18 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1015.829569] loop5: p1 < > p4 [ 1015.841385] loop5: partition table partially beyond EOD, truncated 03:46:19 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aae", 0x91, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1015.901734] loop5: p1 size 2 extends beyond EOD, truncated [ 1015.926576] loop1: p1 < > p4 [ 1015.930385] loop1: partition table partially beyond EOD, truncated [ 1015.973912] loop1: p1 size 2 extends beyond EOD, truncated 03:46:19 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0xbc, "52308b074115cc2eaa5e36d977f8e510ede024216da7e0f4119bfe27b98141065ac7853ae9e3f1d21505469b0bfb736c3f6c8da688475d753a47d7e3eaa0e01ab4be9d014894303509b18f181fd7f05e58c138a119236343609be77ad5dae98badee0e7b34fefecd1f6b460cae3ecc42c8a71730e9dcbe8554f2a287c46ca8ecf0241b4be11f18a224463f135dd3efbf29b49a3689fb94be37b65f6964eaca16053ef2993c24002dbe59d6d4ec5e22a42b8d5e4267c83fc58977c828"}, &(0x7f0000000040)=0xc4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000080)={r4, 0x800, 0x8}, 0x8) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r4, 0x100000001}, 0x8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1016.024634] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1016.032710] loop5: p4 start 1854537728 is beyond EOD, truncated 03:46:19 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0|*\x02\x00', @ifru_flags}) 03:46:19 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 03:46:19 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aae", 0x91, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1016.197637] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1016.203000] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1016.319614] IPVS: ftp: loaded support on port[0] = 21 03:46:19 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0x0, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:19 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed3", 0x8f, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1016.586192] loop1: p1 < > p4 [ 1016.597670] loop1: partition table partially beyond EOD, truncated [ 1016.647287] loop1: p1 size 2 extends beyond EOD, truncated [ 1016.655168] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1016.696681] hfs: can't find a HFS filesystem on dev loop5 [ 1016.756633] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:19 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed3", 0x8f, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:19 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1017.040519] loop5: p1 < > p4 [ 1017.057628] loop5: partition table partially beyond EOD, truncated [ 1017.086187] loop1: p1 < > p4 [ 1017.091838] loop1: partition table partially beyond EOD, truncated 03:46:20 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10005, 0x0) [ 1017.126285] loop5: p1 size 2 extends beyond EOD, truncated [ 1017.148416] loop1: p1 size 2 extends beyond EOD, truncated [ 1017.186856] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1017.195465] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:20 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed3", 0x8f, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1017.330052] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:20 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:20 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xaabff31a8369fc28, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1017.398257] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1017.541335] print_req_error: 100 callbacks suppressed [ 1017.541347] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 1017.574684] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 1017.581550] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1017.589353] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1017.599122] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1017.606377] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1017.612512] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1017.614700] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1017.622962] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1017.632557] print_req_error: I/O error, dev loop1, sector 0 flags 0 03:46:20 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:20 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0}*\x02\x00', @ifru_flags}) 03:46:20 executing program 3: r0 = getpgid(0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:20 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1017.865420] IPVS: ftp: loaded support on port[0] = 21 03:46:21 executing program 3: getpgid(0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1017.894121] net_ratelimit: 22 callbacks suppressed [ 1017.894135] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.904311] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.909485] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.914601] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.931955] hfs: can't find a HFS filesystem on dev loop5 [ 1017.943131] loop1: p1 < > p4 [ 1017.968298] loop1: partition table partially beyond EOD, truncated [ 1018.003286] loop1: p1 size 2 extends beyond EOD, truncated [ 1018.046443] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:21 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1018.127012] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1018.166053] loop5: p1 < > p4 [ 1018.187634] loop5: partition table partially beyond EOD, truncated 03:46:21 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1018.233970] loop5: p1 size 2 extends beyond EOD, [ 1018.251484] truncated [ 1018.351567] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1018.485833] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:21 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1018.544591] loop1: p1 < > p4 [ 1018.547912] loop1: partition table partially beyond EOD, truncated [ 1018.604393] loop1: p1 size 2 extends beyond EOD, truncated [ 1018.626202] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:21 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:21 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1018.766159] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:21 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1018.841983] buffer_io_error: 110 callbacks suppressed [ 1018.841995] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1018.856134] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1018.863754] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1018.871988] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1018.872088] hfs: can't find a HFS filesystem on dev loop5 [ 1018.879695] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:22 executing program 3: getpgid(0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1018.893897] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1018.902226] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1018.909839] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1018.917515] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1018.925114] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:22 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7", 0x4a, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1019.162877] loop1: p1 < > p4 [ 1019.164452] loop5: p1 < > p4 [ 1019.181709] loop5: partition table partially beyond EOD, truncated [ 1019.192319] loop1: partition table partially beyond EOD, truncated [ 1019.247557] loop5: p1 size 2 extends beyond EOD, truncated [ 1019.281919] loop1: p1 size 2 extends beyond EOD, truncated [ 1019.371658] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1019.373673] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1019.434518] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:22 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0~*\x02\x00', @ifru_flags}) 03:46:22 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x5, 0x0) pipe(&(0x7f0000000040)) 03:46:22 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1019.593366] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1019.749941] IPVS: ftp: loaded support on port[0] = 21 03:46:22 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:23 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1019.871825] hfs: can't find a HFS filesystem on dev loop5 [ 1019.895113] protocol 88fb is buggy, dev hsr_slave_0 [ 1019.901202] protocol 88fb is buggy, dev hsr_slave_1 [ 1019.987439] protocol 88fb is buggy, dev hsr_slave_0 [ 1019.992604] protocol 88fb is buggy, dev hsr_slave_1 [ 1019.997747] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.002799] protocol 88fb is buggy, dev hsr_slave_1 03:46:23 executing program 3: getpgid(0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1020.340206] loop1: p1 < > p4 03:46:23 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1020.364407] loop1: partition table partially beyond EOD, truncated [ 1020.369806] loop5: p1 < > p4 [ 1020.377169] loop1: p1 size 2 extends beyond EOD, truncated [ 1020.418628] loop5: partition table partially beyond EOD, truncated [ 1020.461860] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1020.573754] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1020.578656] loop5: p1 size 2 extends beyond EOD, truncated 03:46:23 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1020.718191] loop5: p4 start 1854537728 is beyond EOD, truncated 03:46:23 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:23 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1020.837213] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1021.029418] IPVS: ftp: loaded support on port[0] = 21 [ 1021.085733] loop1: p1 < > p4 [ 1021.112829] loop1: partition table partially beyond EOD, truncated [ 1021.124278] hfs: can't find a HFS filesystem on dev loop5 [ 1021.221761] loop1: p1 size 2 extends beyond EOD, truncated [ 1021.290445] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1021.484122] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1021.529238] loop5: p1 < > p4 [ 1021.548223] loop5: partition table partially beyond EOD, truncated 03:46:24 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x7f*\x02\x00', @ifru_flags}) 03:46:24 executing program 3: getpgid(0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:24 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:24 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1021.592086] loop5: p1 size 2 extends beyond EOD, truncated [ 1021.722504] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1021.785980] IPVS: ftp: loaded support on port[0] = 21 [ 1021.818673] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1021.950669] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:25 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:25 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:25 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x200000000000024f, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:25 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0xe) [ 1022.430540] hfs: can't find a HFS filesystem on dev loop5 [ 1022.440250] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:25 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:25 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1022.912693] hfs: can't find a HFS filesystem on dev loop5 [ 1023.069155] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1023.254390] net_ratelimit: 12 callbacks suppressed [ 1023.254464] protocol 88fb is buggy, dev hsr_slave_0 [ 1023.254516] protocol 88fb is buggy, dev hsr_slave_0 [ 1023.260213] protocol 88fb is buggy, dev hsr_slave_1 [ 1023.265171] protocol 88fb is buggy, dev hsr_slave_1 [ 1023.281151] protocol 88fb is buggy, dev hsr_slave_0 [ 1023.287939] protocol 88fb is buggy, dev hsr_slave_1 03:46:26 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x80*\x02\x00', @ifru_flags}) 03:46:26 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000480)) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:26 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:26 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000040)={'veth1_to_bridge\x00', 0x52d1}) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 03:46:26 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0xe) [ 1023.462016] IPVS: ftp: loaded support on port[0] = 21 [ 1023.640302] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:26 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000480)) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:26 executing program 5: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:27 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1024.055101] protocol 88fb is buggy, dev hsr_slave_0 [ 1024.060864] protocol 88fb is buggy, dev hsr_slave_1 [ 1024.134158] protocol 88fb is buggy, dev hsr_slave_0 [ 1024.139289] protocol 88fb is buggy, dev hsr_slave_1 [ 1024.151673] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1024.205628] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:27 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x7) 03:46:27 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000480)) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:27 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x5) 03:46:27 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0x89, @multicast1, 0x4e20, 0x3, 'ovf\x00', 0x10, 0x101, 0x69}, 0x2c) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1024.617922] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1024.736197] IPVS: set_ctl: invalid protocol: 137 224.0.0.1:20000 03:46:28 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x81*\x02\x00', @ifru_flags}) 03:46:28 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1025.027957] IPVS: ftp: loaded support on port[0] = 21 03:46:28 executing program 3: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) [ 1025.107247] Dev loop1: unable to read RDB block 1 [ 1025.112913] loop1: unable to read partition table [ 1025.137624] loop1: partition table beyond EOD, truncated 03:46:28 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x7) [ 1025.162222] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:28 executing program 3: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 03:46:28 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x5) [ 1025.354276] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:28 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:28 executing program 3: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) [ 1025.597724] Dev loop1: unable to read RDB block 1 [ 1025.638605] loop1: unable to read partition table 03:46:28 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:28 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) shmget$private(0x0, 0x2000, 0x452, &(0x7f0000ffd000/0x2000)=nil) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@local, 0x4e24, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0x80, 0x3b, 0x0, r5}, {0x7, 0x2, 0x5, 0x7, 0x0, 0x5, 0x3d6, 0xffffffff}, {0x5, 0x7569, 0x2, 0x4}, 0x72, 0x6e6bb9, 0x1, 0x1, 0x0, 0x1}, {{@in=@empty, 0x4d5, 0xff}, 0x2, @in6=@ipv4={[], [], @local}, 0x3506, 0x3, 0x0, 0x6, 0x1, 0x50, 0x3}}, 0xe8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1025.681611] loop1: partition table beyond EOD, truncated [ 1025.707051] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1025.785793] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:28 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1026.098607] Dev loop1: unable to read RDB block 1 [ 1026.159281] loop1: unable to read partition table [ 1026.167543] loop1: partition table beyond EOD, truncated [ 1026.199008] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1026.255153] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:29 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x5) 03:46:29 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x82*\x02\x00', @ifru_flags}) 03:46:29 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:29 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x4) [ 1026.468886] IPVS: ftp: loaded support on port[0] = 21 [ 1026.509502] Dev loop1: unable to read RDB block 1 [ 1026.516016] loop1: unable to read partition table [ 1026.541399] loop1: partition table beyond EOD, truncated [ 1026.604475] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1026.784483] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:29 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:30 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1027.130425] Dev loop1: unable to read RDB block 1 03:46:30 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1027.184096] loop1: unable to read partition table [ 1027.200184] loop1: partition table beyond EOD, truncated [ 1027.209620] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:30 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x4) 03:46:30 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) shmget$private(0x0, 0x2000, 0x452, &(0x7f0000ffd000/0x2000)=nil) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@local, 0x4e24, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0x80, 0x3b, 0x0, r5}, {0x7, 0x2, 0x5, 0x7, 0x0, 0x5, 0x3d6, 0xffffffff}, {0x5, 0x7569, 0x2, 0x4}, 0x72, 0x6e6bb9, 0x1, 0x1, 0x0, 0x1}, {{@in=@empty, 0x4d5, 0xff}, 0x2, @in6=@ipv4={[], [], @local}, 0x3506, 0x3, 0x0, 0x6, 0x1, 0x50, 0x3}}, 0xe8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1027.277350] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:30 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1027.549152] Dev loop1: unable to read RDB block 1 [ 1027.599031] loop1: unable to read partition table [ 1027.624464] loop1: partition table beyond EOD, truncated [ 1027.654576] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:30 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1027.860827] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:31 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:31 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x83*\x02\x00', @ifru_flags}) [ 1028.079500] Dev loop1: unable to read RDB block 1 [ 1028.098019] loop1: unable to read partition table [ 1028.104812] IPVS: ftp: loaded support on port[0] = 21 [ 1028.116290] loop1: partition table beyond EOD, truncated [ 1028.122251] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:31 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) shmget$private(0x0, 0x2000, 0x452, &(0x7f0000ffd000/0x2000)=nil) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@local, 0x4e24, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0x80, 0x3b, 0x0, r5}, {0x7, 0x2, 0x5, 0x7, 0x0, 0x5, 0x3d6, 0xffffffff}, {0x5, 0x7569, 0x2, 0x4}, 0x72, 0x6e6bb9, 0x1, 0x1, 0x0, 0x1}, {{@in=@empty, 0x4d5, 0xff}, 0x2, @in6=@ipv4={[], [], @local}, 0x3506, 0x3, 0x0, 0x6, 0x1, 0x50, 0x3}}, 0xe8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1028.294058] net_ratelimit: 22 callbacks suppressed [ 1028.294065] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.304195] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.309349] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.314449] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.360542] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:31 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x8) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000240)={0x1, 0x0, {0x40, 0x495, 0x2014, 0x7, 0xb, 0x0, 0x1}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sync_file_range(r0, 0x20, 0x800, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0xfffffffffffffe56) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:31 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1028.487993] loop5: p1 < > p4 [ 1028.492884] loop5: partition table partially beyond EOD, truncated [ 1028.527303] loop5: p1 size 2 extends beyond EOD, truncated [ 1028.660591] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1028.764589] Dev loop1: unable to read RDB block 1 [ 1028.798043] loop1: unable to read partition table [ 1028.842200] loop1: partition table beyond EOD, truncated [ 1028.871170] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1028.890070] print_req_error: 111 callbacks suppressed [ 1028.890082] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 1028.904530] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1028.916853] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1028.923502] buffer_io_error: 60 callbacks suppressed [ 1028.923512] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1028.936701] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1028.943300] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1028.952013] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1028.958794] Buffer I/O error on dev loop5p1, logical block 0, async page read 03:46:32 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) [ 1029.010891] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1029.017489] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1029.025961] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1029.032437] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1029.040012] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1029.046537] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1029.075348] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1029.081958] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1029.092381] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1029.099004] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1029.108079] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1029.114672] Buffer I/O error on dev loop5p1, logical block 0, async page read 03:46:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1029.123588] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1029.166859] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:32 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:32 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1029.448035] loop5: p1 < > p4 [ 1029.465761] loop5: partition table partially beyond EOD, truncated [ 1029.494119] protocol 88fb is buggy, dev hsr_slave_0 [ 1029.495079] protocol 88fb is buggy, dev hsr_slave_0 [ 1029.499268] protocol 88fb is buggy, dev hsr_slave_1 [ 1029.504610] protocol 88fb is buggy, dev hsr_slave_1 [ 1029.515670] protocol 88fb is buggy, dev hsr_slave_0 [ 1029.521400] protocol 88fb is buggy, dev hsr_slave_1 [ 1029.524570] IPVS: ftp: loaded support on port[0] = 21 03:46:32 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1029.557634] loop5: p1 size 2 extends beyond EOD, [ 1029.565107] truncated [ 1029.623546] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1029.635223] Dev loop1: unable to read RDB block 1 03:46:32 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1029.668225] loop1: unable to read partition table [ 1029.697009] loop1: partition table beyond EOD, truncated [ 1029.708097] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1029.814696] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1029.925198] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:33 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:33 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x84*\x02\x00', @ifru_flags}) 03:46:33 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 03:46:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:33 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000", 0x48, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:33 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:33 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r1, 0x540c) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1030.688477] IPVS: ftp: loaded support on port[0] = 21 [ 1030.705949] Dev loop1: unable to read RDB block 1 [ 1030.716396] loop5: p1 < > p4 [ 1030.728824] loop1: unable to read partition table 03:46:33 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1030.734228] loop5: partition table partially beyond EOD, truncated [ 1030.788259] loop5: p1 size 2 extends beyond EOD, [ 1030.789799] loop1: partition table beyond EOD, [ 1030.795724] truncated [ 1030.839521] truncated [ 1030.860027] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1030.874123] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1030.996740] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:34 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1031.072180] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:34 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000", 0x48, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:34 executing program 5: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x83*\x02\x00', @ifru_flags}) 03:46:34 executing program 2: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0:\x01\x00', @ifru_flags}) 03:46:34 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) [ 1031.412469] Dev loop1: unable to read RDB block 1 [ 1031.420696] IPVS: ftp: loaded support on port[0] = 21 [ 1031.428384] loop1: unable to read partition table [ 1031.446367] loop1: partition table beyond EOD, truncated [ 1031.472799] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1031.596358] IPVS: ftp: loaded support on port[0] = 21 [ 1031.629502] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:35 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x85*\x02\x00', @ifru_flags}) 03:46:35 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000", 0x48, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:35 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0x4240a41d) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1032.133728] IPVS: ftp: loaded support on port[0] = 21 [ 1032.216716] Dev loop1: unable to read RDB block 1 [ 1032.265997] loop1: unable to read partition table [ 1032.336912] loop1: partition table beyond EOD, truncated 03:46:35 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1032.391347] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:35 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r1, 0x540c) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1032.465521] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1032.535387] IPv6: : Disabled Multicast RS 03:46:35 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:35 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1032.770869] Dev loop1: unable to read RDB block 1 [ 1032.784854] loop1: unable to read partition table [ 1032.790100] loop1: partition table beyond EOD, truncated [ 1032.835613] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1033.030907] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:36 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:36 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1033.215368] IPVS: ftp: loaded support on port[0] = 21 03:46:36 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000100)={@local, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8) [ 1033.286949] Dev loop1: unable to read RDB block 1 03:46:36 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1033.348985] loop1: unable to read partition table [ 1033.408806] loop1: partition table beyond EOD, truncated [ 1033.441395] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:36 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r1, 0x540c) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1033.575117] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1033.654077] net_ratelimit: 18 callbacks suppressed [ 1033.654084] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.654088] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.654126] protocol 88fb is buggy, dev hsr_slave_1 [ 1033.659144] protocol 88fb is buggy, dev hsr_slave_1 [ 1033.664215] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.684341] protocol 88fb is buggy, dev hsr_slave_1 03:46:36 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x03\x00', @ifru_flags}) 03:46:36 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:36 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1033.932048] IPVS: ftp: loaded support on port[0] = 21 [ 1033.935947] Dev loop1: unable to read RDB block 1 [ 1033.969003] loop1: unable to read partition table [ 1034.005425] loop1: partition table beyond EOD, truncated [ 1034.036836] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:37 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1034.145660] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:37 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:37 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1034.322590] Dev loop1: unable to read RDB block 1 [ 1034.330653] loop1: unable to read partition table [ 1034.351175] loop1: partition table beyond EOD, truncated 03:46:37 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1034.390001] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:37 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r1, 0x540c) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1034.454049] protocol 88fb is buggy, dev hsr_slave_0 [ 1034.459163] protocol 88fb is buggy, dev hsr_slave_1 [ 1034.475243] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1034.534066] protocol 88fb is buggy, dev hsr_slave_0 [ 1034.539193] protocol 88fb is buggy, dev hsr_slave_1 03:46:37 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:37 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='lapb0\x00'}) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000100)) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:37 executing program 2: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1034.799709] Dev loop1: unable to read RDB block 1 [ 1034.841476] loop1: unable to read partition table [ 1034.884624] loop1: partition table beyond EOD, truncated [ 1034.922012] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1034.956245] IPv6: : Disabled Multicast RS [ 1035.025690] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:38 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:38 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x04\x00', @ifru_flags}) 03:46:38 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:38 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:38 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x0, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1035.382900] IPVS: ftp: loaded support on port[0] = 21 03:46:38 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 1035.427005] Dev loop1: unable to read RDB block 1 [ 1035.432724] loop1: unable to read partition table [ 1035.485822] loop1: partition table beyond EOD, truncated [ 1035.512653] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1035.578153] hfs: can't find a HFS filesystem on dev loop5 [ 1035.756328] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1035.788433] Dev loop5: unable to read RDB block 1 [ 1035.825277] loop5: unable to read partition table [ 1035.845899] loop5: partition table beyond EOD, truncated [ 1035.881696] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 03:46:39 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1036.073668] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:39 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f0000000100)=0x4) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x25b, &(0x7f0000000240)}, 0xfffffde3) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x81) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_mreq(r3, 0x0, 0x27, &(0x7f00000001c0)={@loopback, @multicast1}, 0x8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1036.125709] Dev loop1: unable to read RDB block 1 [ 1036.173699] loop1: unable to read partition table 03:46:39 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x0, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1036.200364] loop1: partition table beyond EOD, truncated [ 1036.220128] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1036.292640] IPv6: : Disabled Multicast RS [ 1036.307286] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:39 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:39 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 1036.399689] hfs: can't find a HFS filesystem on dev loop5 03:46:39 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x01\x00', @ifru_flags}) [ 1036.536955] Dev loop5: unable to read RDB block 1 [ 1036.545845] loop5: unable to read partition table [ 1036.561820] Dev loop1: unable to read RDB block 1 [ 1036.572099] loop5: partition table beyond EOD, truncated [ 1036.586602] loop1: unable to read partition table [ 1036.595076] IPVS: ftp: loaded support on port[0] = 21 [ 1036.617946] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1036.629410] loop1: partition table beyond EOD, truncated [ 1036.658167] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1036.736747] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:39 executing program 5: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1036.883090] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:40 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1037.101087] Dev loop5: unable to read RDB block 1 03:46:40 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x0, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1037.128615] loop5: unable to read partition table [ 1037.145615] Dev loop1: unable to read RDB block 1 [ 1037.150597] loop5: partition table beyond EOD, truncated 03:46:40 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) accept$packet(r0, &(0x7f0000001040)={0x11, 0x0, 0x0}, &(0x7f0000001080)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f00000010c0)={@local, @remote, r5}, 0xc) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000002c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000300)=0x10) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x6a, 0x9, 0xb, 0x6, 0x0, 0x81}) connect$inet(r2, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) shutdown(r1, 0x1) accept4$ax25(r1, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @bcast, @bcast, @netrom, @default, @null, @netrom, @null]}, &(0x7f0000000080)=0x48, 0x80000) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000100)=0x10000, 0x4) [ 1037.182006] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1037.221599] loop1: unable to read partition table [ 1037.240784] loop1: partition table beyond EOD, truncated [ 1037.260056] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1037.288907] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:40 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:40 executing program 5: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1037.479796] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1037.523706] IPv6: : Disabled Multicast RS 03:46:40 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1037.647956] Dev loop5: unable to read RDB block 1 [ 1037.684626] loop5: unable to read partition table [ 1037.696547] loop5: partition table beyond EOD, truncated [ 1037.737283] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1037.805956] Dev loop1: unable to read RDB block 1 03:46:40 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1037.834862] loop1: unable to read partition table [ 1037.870284] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1037.897429] loop1: partition table beyond EOD, truncated [ 1037.964289] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:41 executing program 5 (fault-call:12 fault-nth:0): r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1038.020155] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:41 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:41 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1038.186862] hfs: can't find a HFS filesystem on dev loop5 [ 1038.339457] FAULT_INJECTION: forcing a failure. [ 1038.339457] name failslab, interval 1, probability 0, space 0, times 0 [ 1038.419398] CPU: 0 PID: 1245 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 1038.426650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1038.436023] Call Trace: [ 1038.438657] dump_stack+0x172/0x1f0 [ 1038.442317] should_fail.cold+0xa/0x1b [ 1038.446230] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1038.451358] ? lock_downgrade+0x810/0x810 [ 1038.455536] ? ___might_sleep+0x163/0x280 [ 1038.459712] __should_failslab+0x121/0x190 [ 1038.463971] should_failslab+0x9/0x14 [ 1038.467793] __kmalloc+0x2dc/0x740 [ 1038.471345] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 1038.476205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1038.481759] ? strnlen_user+0x1f0/0x280 [ 1038.485809] ? __x64_sys_memfd_create+0x13c/0x470 [ 1038.490657] __x64_sys_memfd_create+0x13c/0x470 [ 1038.495337] ? memfd_fcntl+0x1550/0x1550 [ 1038.499408] ? do_syscall_64+0x26/0x610 [ 1038.503382] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1038.507967] ? trace_hardirqs_on+0x67/0x230 [ 1038.512290] do_syscall_64+0x103/0x610 [ 1038.516194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1038.521379] RIP: 0033:0x457e29 [ 1038.524568] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1038.543475] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1038.551186] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29 [ 1038.558457] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b [ 1038.565727] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1038.573011] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340 [ 1038.580300] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008 [ 1038.605822] Dev loop1: unable to read RDB block 1 [ 1038.617062] loop1: unable to read partition table [ 1038.635361] loop1: partition table beyond EOD, truncated [ 1038.653813] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:46:41 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x02\x00', @ifru_flags}) 03:46:41 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:41 executing program 2 (fault-call:12 fault-nth:0): r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:41 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x40) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:41 executing program 5 (fault-call:12 fault-nth:1): r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1038.770863] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1038.861245] FAULT_INJECTION: forcing a failure. [ 1038.861245] name failslab, interval 1, probability 0, space 0, times 0 [ 1038.874315] CPU: 1 PID: 1308 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #86 [ 1038.881541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1038.890924] Call Trace: [ 1038.893529] dump_stack+0x172/0x1f0 [ 1038.897170] should_fail.cold+0xa/0x1b [ 1038.901061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1038.906180] ? lock_downgrade+0x810/0x810 [ 1038.910331] ? ___might_sleep+0x163/0x280 [ 1038.914479] __should_failslab+0x121/0x190 [ 1038.918713] should_failslab+0x9/0x14 [ 1038.922514] __kmalloc+0x2dc/0x740 [ 1038.926051] ? audit_add_tree_rule.cold+0x3b/0x3b [ 1038.930891] ? strnlen_user+0x1f0/0x280 [ 1038.934863] ? __x64_sys_memfd_create+0x13c/0x470 [ 1038.939706] __x64_sys_memfd_create+0x13c/0x470 [ 1038.944386] ? memfd_fcntl+0x1550/0x1550 [ 1038.948453] ? do_syscall_64+0x26/0x610 [ 1038.952423] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1038.957003] ? trace_hardirqs_on+0x67/0x230 [ 1038.961328] do_syscall_64+0x103/0x610 [ 1038.965230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1038.970417] RIP: 0033:0x457e29 [ 1038.973607] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1038.992504] RSP: 002b:00007f785cd4ba18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1039.000212] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29 03:46:42 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1039.007476] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b [ 1039.014740] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1039.022004] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340 [ 1039.029268] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000006 [ 1039.131493] hfs: can't find a HFS filesystem on dev loop5 [ 1039.143767] IPVS: ftp: loaded support on port[0] = 21 [ 1039.190937] FAULT_INJECTION: forcing a failure. [ 1039.190937] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.247775] Dev loop1: unable to read RDB block 1 [ 1039.258377] loop1: unable to read partition table [ 1039.271367] loop1: partition table beyond EOD, truncated [ 1039.287072] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1039.387851] CPU: 1 PID: 1331 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 1039.395089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.404597] Call Trace: [ 1039.407220] dump_stack+0x172/0x1f0 [ 1039.410873] should_fail.cold+0xa/0x1b [ 1039.414788] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1039.419913] ? lock_downgrade+0x810/0x810 [ 1039.424086] ? ___might_sleep+0x163/0x280 [ 1039.428256] __should_failslab+0x121/0x190 [ 1039.432529] ? shmem_destroy_callback+0xc0/0xc0 [ 1039.437220] should_failslab+0x9/0x14 [ 1039.441036] kmem_cache_alloc+0x2b2/0x6f0 [ 1039.445197] ? __alloc_fd+0x430/0x530 [ 1039.449017] ? shmem_destroy_callback+0xc0/0xc0 [ 1039.453701] shmem_alloc_inode+0x1c/0x50 [ 1039.457779] alloc_inode+0x66/0x190 [ 1039.461427] new_inode_pseudo+0x19/0xf0 [ 1039.465417] new_inode+0x1f/0x40 [ 1039.468801] shmem_get_inode+0x84/0x780 [ 1039.472797] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1039.477665] shmem_file_setup+0x66/0x90 [ 1039.481664] __x64_sys_memfd_create+0x2a2/0x470 03:46:42 executing program 2 (fault-call:12 fault-nth:1): r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1039.486356] ? memfd_fcntl+0x1550/0x1550 [ 1039.490436] ? do_syscall_64+0x26/0x610 [ 1039.494424] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1039.499022] ? trace_hardirqs_on+0x67/0x230 [ 1039.503370] do_syscall_64+0x103/0x610 [ 1039.507285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1039.512485] RIP: 0033:0x457e29 [ 1039.515698] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:46:42 executing program 5 (fault-call:12 fault-nth:2): r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1039.534613] RSP: 002b:00007fa6188e9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1039.542343] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29 [ 1039.549646] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b [ 1039.556934] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1039.564214] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340 [ 1039.571508] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008 [ 1039.661749] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:42 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1039.761580] FAULT_INJECTION: forcing a failure. [ 1039.761580] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.804587] hfs: can't find a HFS filesystem on dev loop5 [ 1039.830818] FAULT_INJECTION: forcing a failure. [ 1039.830818] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.867719] CPU: 1 PID: 1376 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 1039.874952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.884713] Call Trace: [ 1039.887325] dump_stack+0x172/0x1f0 [ 1039.890986] should_fail.cold+0xa/0x1b [ 1039.894064] net_ratelimit: 20 callbacks suppressed [ 1039.894071] protocol 88fb is buggy, dev hsr_slave_0 [ 1039.894884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1039.899839] protocol 88fb is buggy, dev hsr_slave_1 [ 1039.904820] ? lock_downgrade+0x810/0x810 [ 1039.904837] ? ___might_sleep+0x163/0x280 [ 1039.904853] __should_failslab+0x121/0x190 [ 1039.904868] should_failslab+0x9/0x14 [ 1039.904883] kmem_cache_alloc+0x2b2/0x6f0 [ 1039.910053] protocol 88fb is buggy, dev hsr_slave_0 [ 1039.914985] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1039.915073] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1039.915094] __d_alloc+0x2e/0x8c0 [ 1039.919250] protocol 88fb is buggy, dev hsr_slave_1 [ 1039.923377] d_alloc_pseudo+0x1e/0x30 [ 1039.962920] alloc_file_pseudo+0xe2/0x280 [ 1039.967080] ? alloc_file+0x4d0/0x4d0 [ 1039.970894] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1039.976439] ? kasan_check_write+0x14/0x20 [ 1039.980692] __shmem_file_setup.part.0+0x108/0x2b0 [ 1039.985633] shmem_file_setup+0x66/0x90 [ 1039.989620] __x64_sys_memfd_create+0x2a2/0x470 [ 1039.994297] ? memfd_fcntl+0x1550/0x1550 [ 1039.998376] do_syscall_64+0x103/0x610 [ 1040.002272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1040.007478] RIP: 0033:0x457e29 [ 1040.010680] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1040.029584] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1040.037297] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29 [ 1040.044571] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b [ 1040.052312] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1040.059593] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340 03:46:43 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1040.066877] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008 [ 1040.074986] protocol 88fb is buggy, dev hsr_slave_0 [ 1040.077494] CPU: 0 PID: 1345 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #86 [ 1040.080547] protocol 88fb is buggy, dev hsr_slave_1 [ 1040.087230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.087236] Call Trace: [ 1040.087259] dump_stack+0x172/0x1f0 [ 1040.087278] should_fail.cold+0xa/0x1b [ 1040.087297] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1040.087313] ? lock_downgrade+0x810/0x810 [ 1040.087332] ? ___might_sleep+0x163/0x280 [ 1040.087348] __should_failslab+0x121/0x190 [ 1040.087364] ? shmem_destroy_callback+0xc0/0xc0 [ 1040.101743] should_failslab+0x9/0x14 [ 1040.101761] kmem_cache_alloc+0x2b2/0x6f0 [ 1040.101780] ? shmem_alloc_inode+0xb/0x50 [ 1040.101795] ? shmem_destroy_callback+0xc0/0xc0 [ 1040.101810] shmem_alloc_inode+0x1c/0x50 [ 1040.134428] alloc_inode+0x66/0x190 [ 1040.134443] new_inode_pseudo+0x19/0xf0 [ 1040.134465] new_inode+0x1f/0x40 [ 1040.134481] shmem_get_inode+0x84/0x780 [ 1040.134502] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1040.134522] shmem_file_setup+0x66/0x90 [ 1040.179094] __x64_sys_memfd_create+0x2a2/0x470 [ 1040.183789] ? memfd_fcntl+0x1550/0x1550 [ 1040.187872] ? do_syscall_64+0x26/0x610 [ 1040.191865] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1040.196468] ? trace_hardirqs_on+0x67/0x230 [ 1040.196490] do_syscall_64+0x103/0x610 [ 1040.196511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1040.196522] RIP: 0033:0x457e29 [ 1040.196536] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1040.196545] RSP: 002b:00007f785cd4ba18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1040.209927] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29 [ 1040.209937] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b [ 1040.209945] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1040.209953] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340 [ 1040.209963] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000006 [ 1040.308094] IPVS: ftp: loaded support on port[0] = 21 03:46:43 executing program 5 (fault-call:12 fault-nth:3): r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:43 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1040.614724] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1040.635942] hfs: can't find a HFS filesystem on dev loop5 [ 1040.656145] FAULT_INJECTION: forcing a failure. [ 1040.656145] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.694076] protocol 88fb is buggy, dev hsr_slave_0 [ 1040.699196] protocol 88fb is buggy, dev hsr_slave_1 [ 1040.741409] CPU: 0 PID: 1474 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 1040.748648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.758026] Call Trace: [ 1040.760639] dump_stack+0x172/0x1f0 [ 1040.764293] should_fail.cold+0xa/0x1b [ 1040.768203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1040.773327] ? lock_downgrade+0x810/0x810 [ 1040.777499] ? ___might_sleep+0x163/0x280 [ 1040.781678] __should_failslab+0x121/0x190 [ 1040.785935] should_failslab+0x9/0x14 [ 1040.789757] kmem_cache_alloc+0x2b2/0x6f0 [ 1040.793932] __alloc_file+0x27/0x300 [ 1040.797676] alloc_empty_file+0x72/0x170 [ 1040.801760] alloc_file+0x5e/0x4d0 [ 1040.805325] alloc_file_pseudo+0x189/0x280 [ 1040.809582] ? alloc_file+0x4d0/0x4d0 [ 1040.813410] ? kasan_check_write+0x14/0x20 [ 1040.817667] __shmem_file_setup.part.0+0x108/0x2b0 [ 1040.822622] shmem_file_setup+0x66/0x90 [ 1040.826616] __x64_sys_memfd_create+0x2a2/0x470 [ 1040.831290] ? memfd_fcntl+0x1550/0x1550 [ 1040.835362] ? do_syscall_64+0x26/0x610 [ 1040.839357] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1040.843961] ? trace_hardirqs_on+0x67/0x230 [ 1040.848304] do_syscall_64+0x103/0x610 [ 1040.852211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1040.857425] RIP: 0033:0x457e29 [ 1040.860634] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1040.879808] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1040.887539] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29 [ 1040.894863] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b [ 1040.902159] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1040.909451] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340 [ 1040.916742] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008 [ 1040.934786] protocol 88fb is buggy, dev hsr_slave_0 [ 1040.940410] protocol 88fb is buggy, dev hsr_slave_1 03:46:44 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x03\x00', @ifru_flags}) 03:46:44 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:44 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0xf4, r4, 0x1c, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x14}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x91}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:44 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1041.345582] IPVS: ftp: loaded support on port[0] = 21 03:46:44 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:44 executing program 5 (fault-call:12 fault-nth:4): r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1041.470138] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:44 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1041.680113] FAULT_INJECTION: forcing a failure. [ 1041.680113] name failslab, interval 1, probability 0, space 0, times 0 [ 1041.687253] hfs: can't find a HFS filesystem on dev loop5 [ 1041.805438] CPU: 0 PID: 1514 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 1041.812674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1041.812680] Call Trace: [ 1041.812704] dump_stack+0x172/0x1f0 [ 1041.812725] should_fail.cold+0xa/0x1b [ 1041.812742] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1041.812757] ? lock_downgrade+0x810/0x810 [ 1041.812772] ? ___might_sleep+0x163/0x280 [ 1041.812788] __should_failslab+0x121/0x190 [ 1041.812806] should_failslab+0x9/0x14 [ 1041.812821] kmem_cache_alloc_trace+0x2d1/0x760 [ 1041.812833] ? ___might_sleep+0x163/0x280 [ 1041.812849] ? __might_sleep+0x95/0x190 [ 1041.828441] apparmor_file_alloc_security+0x112/0x940 [ 1041.828467] security_file_alloc+0x69/0xb0 [ 1041.828487] __alloc_file+0xac/0x300 [ 1041.828502] alloc_empty_file+0x72/0x170 [ 1041.828519] alloc_file+0x5e/0x4d0 [ 1041.828537] alloc_file_pseudo+0x189/0x280 [ 1041.828551] ? alloc_file+0x4d0/0x4d0 [ 1041.828580] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1041.837563] ? kasan_check_write+0x14/0x20 [ 1041.837592] __shmem_file_setup.part.0+0x108/0x2b0 [ 1041.837610] shmem_file_setup+0x66/0x90 [ 1041.837628] __x64_sys_memfd_create+0x2a2/0x470 [ 1041.837645] ? memfd_fcntl+0x1550/0x1550 [ 1041.837670] do_syscall_64+0x103/0x610 [ 1041.837686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1041.837697] RIP: 0033:0x457e29 [ 1041.837710] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:46:45 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1041.837716] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1041.837730] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29 [ 1041.837738] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b [ 1041.837746] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1041.837754] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340 [ 1041.837762] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008 03:46:45 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:45 executing program 5 (fault-call:12 fault-nth:5): r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1042.205243] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:45 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(0xffffffffffffffff, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1042.307648] hfs: can't find a HFS filesystem on dev loop5 [ 1042.453814] FAULT_INJECTION: forcing a failure. [ 1042.453814] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.536957] CPU: 1 PID: 1551 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 1042.544199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.553576] Call Trace: [ 1042.556194] dump_stack+0x172/0x1f0 [ 1042.559850] should_fail.cold+0xa/0x1b [ 1042.563875] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1042.569014] ? lock_downgrade+0x810/0x810 [ 1042.573175] ? ___might_sleep+0x163/0x280 [ 1042.577330] __should_failslab+0x121/0x190 [ 1042.581584] should_failslab+0x9/0x14 [ 1042.585408] kmem_cache_alloc_trace+0x2d1/0x760 [ 1042.590097] ? ___might_sleep+0x163/0x280 [ 1042.594267] ? __might_sleep+0x95/0x190 [ 1042.598270] apparmor_file_alloc_security+0x112/0x940 [ 1042.603570] security_file_alloc+0x69/0xb0 [ 1042.607829] __alloc_file+0xac/0x300 [ 1042.611559] alloc_empty_file+0x72/0x170 [ 1042.615643] alloc_file+0x5e/0x4d0 [ 1042.619206] alloc_file_pseudo+0x189/0x280 [ 1042.623580] ? alloc_file+0x4d0/0x4d0 [ 1042.627406] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1042.632966] ? kasan_check_write+0x14/0x20 [ 1042.637240] __shmem_file_setup.part.0+0x108/0x2b0 [ 1042.642195] shmem_file_setup+0x66/0x90 [ 1042.646202] __x64_sys_memfd_create+0x2a2/0x470 [ 1042.650894] ? memfd_fcntl+0x1550/0x1550 [ 1042.654982] do_syscall_64+0x103/0x610 [ 1042.658892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1042.664099] RIP: 0033:0x457e29 [ 1042.667304] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:46:45 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1042.686221] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1042.693959] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29 [ 1042.701264] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b [ 1042.708543] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1042.715823] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340 [ 1042.723106] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008 [ 1042.737841] loop1: p1 < > p4 03:46:45 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x04\x00', @ifru_flags}) 03:46:45 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) syz_emit_ethernet(0x7d, &(0x7f0000000040)={@random="a3bc124d9eb6", @random="d3fb56e52b0c", [{[{0x9100, 0x8, 0x6, 0x4}], {0x8100, 0xfb7e, 0x480efb9b}}], {@ipv4={0x800, {{0x10, 0x4, 0x695, 0x8, 0x67, 0x67, 0x4, 0x46, 0xf442eaaf6a35b75b, 0x0, @local, @broadcast, {[@rr={0x7, 0x1f, 0x7, [@empty, @multicast2, @broadcast, @loopback, @multicast2, @loopback, @remote]}, @end, @generic={0x44, 0x9, "45c38dec7badbf"}]}}, @udp={0x4e20, 0x4e23, 0x27, 0x0, [@guehdr={0x2, 0x4, 0x0, 0x8, 0x0, [0x80]}, @guehdr={0x2, 0x8, 0x1, 0x40, 0x100, [0x80]}], "4c740ce4ca641196a08908501b4f8a"}}}}}, &(0x7f0000000100)={0x1, 0x2, [0x37b, 0x2ec, 0x624, 0xd23]}) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1042.762067] loop1: partition table partially beyond EOD, truncated [ 1042.781350] loop1: p1 size 2 extends beyond EOD, truncated [ 1042.818659] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1042.900141] IPVS: ftp: loaded support on port[0] = 21 [ 1042.912133] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1042.976127] print_req_error: 23 callbacks suppressed [ 1042.976140] print_req_error: I/O error, dev loop1, sector 0 flags 80700 03:46:46 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:46 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(0xffffffffffffffff, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1043.081571] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.088399] buffer_io_error: 20 callbacks suppressed [ 1043.088408] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.102272] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.108927] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.119717] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.126422] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.135177] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.141845] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.150158] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.156812] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.164974] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.171621] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:46 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:46 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1043.224946] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.231414] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.238914] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.245415] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.252863] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1043.259381] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.266879] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1043.556919] loop1: p1 < > p4 [ 1043.577784] loop1: partition table partially beyond EOD, truncated [ 1043.622641] loop1: p1 size 2 extends beyond EOD, truncated [ 1043.730061] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:46 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:46 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:47 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) sendto$inet(r0, &(0x7f0000000040)="7f8fbc20880f90670ab6f44c5ce79d33097c754c84d31848d025b92f9451e26e4f145a41b8ca929b882b7906cb5e6382c5b45dce3c74dbe162b7ee40fe62755d40d1df2c2d3e31adc5aca8cbd8083c95f675", 0x52, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x9, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000900)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000800)={0xa4, r4, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xc863}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8159}]}, 0xa4}}, 0x4000) [ 1043.890865] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1043.948045] hfs: can't find a HFS filesystem on dev loop5 03:46:47 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(0xffffffffffffffff, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1044.159594] loop5: p1 < > p4 [ 1044.178673] loop5: partition table partially beyond EOD, truncated [ 1044.230869] IPv6: : Disabled Multicast RS 03:46:47 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1044.267410] loop1: p1 < > p4 [ 1044.280625] loop1: partition table partially beyond EOD, truncated 03:46:47 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1044.337013] loop5: p1 size 2 extends beyond EOD, truncated [ 1044.345776] loop1: p1 size 2 extends beyond EOD, truncated [ 1044.406036] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1044.433733] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1044.661694] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1044.687257] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:47 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x05\x00', @ifru_flags}) 03:46:47 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:47 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1044.848842] IPVS: ftp: loaded support on port[0] = 21 03:46:47 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1045.014340] hfs: can't find a HFS filesystem on dev loop5 03:46:48 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000040)={0x0, 0x3, 0x1c}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1045.094061] net_ratelimit: 16 callbacks suppressed [ 1045.094069] protocol 88fb is buggy, dev hsr_slave_0 [ 1045.104236] protocol 88fb is buggy, dev hsr_slave_1 [ 1045.109375] protocol 88fb is buggy, dev hsr_slave_0 [ 1045.114474] protocol 88fb is buggy, dev hsr_slave_1 [ 1045.253625] loop1: p1 < > p4 [ 1045.259926] loop1: partition table partially beyond EOD, truncated 03:46:48 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1045.352410] loop1: p1 size 2 extends beyond EOD, truncated [ 1045.375472] loop5: p1 < > p4 [ 1045.394523] loop5: partition table partially beyond EOD, truncated 03:46:48 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x300, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1045.415445] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1045.421548] loop5: p1 size 2 extends beyond EOD, truncated [ 1045.488546] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1045.625660] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1045.679503] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:48 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x340, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:48 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:49 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1046.076438] loop1: p1 < > p4 [ 1046.097124] hfs: can't find a HFS filesystem on dev loop5 [ 1046.119634] IPv6: : Disabled Multicast RS [ 1046.124916] loop1: partition table partially beyond EOD, truncated [ 1046.134098] protocol 88fb is buggy, dev hsr_slave_0 [ 1046.139253] protocol 88fb is buggy, dev hsr_slave_1 [ 1046.144408] protocol 88fb is buggy, dev hsr_slave_0 [ 1046.149474] protocol 88fb is buggy, dev hsr_slave_1 [ 1046.155486] loop1: p1 size 2 extends beyond EOD, truncated [ 1046.163022] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:49 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x600, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1046.294035] protocol 88fb is buggy, dev hsr_slave_0 [ 1046.299260] protocol 88fb is buggy, dev hsr_slave_1 [ 1046.412223] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1046.421630] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 03:46:49 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:49 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x06\x00', @ifru_flags}) 03:46:49 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1046.555468] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:49 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:49 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1046.717977] IPVS: ftp: loaded support on port[0] = 21 03:46:49 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x700, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1046.835244] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 03:46:50 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:50 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1047.164609] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:50 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f00, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:50 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1047.309545] hfs: can't find a HFS filesystem on dev loop5 03:46:50 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1047.534517] loop5: p1 < > p4 [ 1047.545985] loop1: p1 < > p4 [ 1047.554724] loop5: partition table partially beyond EOD, truncated [ 1047.596643] loop5: p1 size 2 extends beyond EOD, truncated [ 1047.604316] loop1: partition table partially beyond EOD, truncated 03:46:50 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4003, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1047.646844] loop1: p1 size 2 extends beyond EOD, truncated 03:46:50 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f00, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1047.687176] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1047.690622] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1047.799769] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1047.963885] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1048.071231] IPv6: : Disabled Multicast RS 03:46:51 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x02\x06\x00', @ifru_flags}) 03:46:51 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:51 executing program 0: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x04\x00', @ifru_flags}) 03:46:51 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:51 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1048.280444] IPVS: ftp: loaded support on port[0] = 21 [ 1048.329272] print_req_error: 45 callbacks suppressed [ 1048.329283] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 1048.345929] hfs: can't find a HFS filesystem on dev loop5 [ 1048.373890] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1048.380582] buffer_io_error: 40 callbacks suppressed [ 1048.380592] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1048.387240] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1048.393747] IPVS: ftp: loaded support on port[0] = 21 [ 1048.399981] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1048.424429] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1048.430938] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1048.438516] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1048.445037] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1048.452616] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1048.459243] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1048.466775] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1048.473195] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1048.473327] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1048.487875] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1048.495369] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1048.501798] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:51 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1048.635422] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 1048.646900] loop1: p1 < > p4 [ 1048.650782] loop1: partition table partially beyond EOD, truncated [ 1048.654321] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1048.674134] Buffer I/O error on dev loop5p1, logical block 0, async page read 03:46:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x300, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1048.699571] loop1: p1 size 2 extends beyond EOD, truncated [ 1048.769790] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1048.846634] hfs: can't find a HFS filesystem on dev loop5 [ 1048.896813] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:52 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:52 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1049.164262] loop5: p1 < > p4 [ 1049.189343] loop5: partition table partially beyond EOD, truncated [ 1049.288718] loop5: p1 size 2 extends beyond EOD, truncated [ 1049.344235] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 1049.465464] loop5: p4 start 1854537728 is beyond EOD, truncated 03:46:52 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:52 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1049.581730] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1049.593097] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1049.691166] IPv6: : Disabled Multicast RS [ 1049.863470] IPv6: : Disabled Multicast RS 03:46:53 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) 03:46:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x340, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:53 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:53 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\a\x00', @ifru_flags}) 03:46:53 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4003, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1050.147238] IPVS: ftp: loaded support on port[0] = 21 [ 1050.160035] hfs: can't find a HFS filesystem on dev loop5 [ 1050.227434] loop1: p1 < > p4 [ 1050.231464] loop1: partition table partially beyond EOD, truncated 03:46:53 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1050.276104] loop1: p1 size 2 extends beyond EOD, truncated [ 1050.294660] net_ratelimit: 14 callbacks suppressed [ 1050.294669] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.305667] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.312358] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.318394] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.369463] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x900, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:53 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1050.454096] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.459247] protocol 88fb is buggy, dev hsr_slave_1 [ 1050.510160] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:53 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:53 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2) [ 1050.686408] hfs: can't find a HFS filesystem on dev loop5 03:46:53 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1051.051622] loop5: p1 < > p4 [ 1051.071287] loop1: p1 < > p4 [ 1051.084219] loop5: partition table partially beyond EOD, truncated [ 1051.090957] loop1: partition table partially beyond EOD, truncated 03:46:54 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1051.094060] protocol 88fb is buggy, dev hsr_slave_0 [ 1051.102375] protocol 88fb is buggy, dev hsr_slave_1 [ 1051.145935] loop1: p1 size 2 extends beyond EOD, truncated [ 1051.190536] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1051.236836] loop5: p4 start 1854537728 is beyond EOD, truncated 03:46:54 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1051.334074] protocol 88fb is buggy, dev hsr_slave_0 [ 1051.339211] protocol 88fb is buggy, dev hsr_slave_1 03:46:54 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:54 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1051.412157] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1051.508654] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1051.912014] IPv6: : Disabled Multicast RS 03:46:55 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\b\x00', @ifru_flags}) 03:46:55 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2) 03:46:55 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:55 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f00, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:55 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) [ 1052.343711] hfs: can't find a HFS filesystem on dev loop5 [ 1052.377602] loop1: p1 < > p4 [ 1052.403888] loop1: partition table partially beyond EOD, truncated 03:46:55 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1052.446837] IPVS: ftp: loaded support on port[0] = 21 [ 1052.457410] loop1: p1 size 2 extends beyond EOD, truncated [ 1052.488018] loop1: p4 start 1854537728 is beyond EOD, [ 1052.488026] truncated 03:46:55 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:55 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x40030000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1052.612878] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:46:55 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:55 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2) 03:46:56 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1052.995075] hfs: can't find a HFS filesystem on dev loop5 03:46:56 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1053.088150] loop1: p1 < > p4 [ 1053.107208] loop1: partition table partially beyond EOD, truncated [ 1053.152255] loop1: p1 size 2 extends beyond EOD, truncated [ 1053.226623] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1053.505520] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1053.540592] print_req_error: 65 callbacks suppressed [ 1053.540603] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 1053.561085] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.567952] buffer_io_error: 58 callbacks suppressed [ 1053.567962] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.573412] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.588062] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.598877] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.605656] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.613800] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.620322] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.629277] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.636231] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.644279] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.650914] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.659727] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.666434] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.675253] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.681854] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.689681] IPv6: : Disabled Multicast RS [ 1053.690023] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 1053.700606] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 1053.708516] Buffer I/O error on dev loop1p1, logical block 0, async page read 03:46:56 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:56 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4003, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:56 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfcfdffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:56 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x03\b\x00', @ifru_flags}) 03:46:56 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:46:57 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x80000000000000, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000002400)=""/4096, 0xc8b7) [ 1054.015043] loop1: p1 < > p4 [ 1054.028943] IPVS: ftp: loaded support on port[0] = 21 [ 1054.038637] hfs: can't find a HFS filesystem on dev loop5 03:46:57 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1054.093097] loop1: partition table partially beyond EOD, truncated [ 1054.136780] loop1: p1 size 2 extends beyond EOD, truncated [ 1054.183518] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1054.312060] loop5: p1 < > p4 03:46:57 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz1\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = getpgid(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x110, 0xffffffffffffffff, 0x8000000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, r1) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x3, 0xca, 0xca30}) creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, 0x0}) fstatfs(r2, &(0x7f0000000400)=""/128) [ 1054.413473] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1054.470885] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1054.550872] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:57 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:46:57 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfeffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:46:57 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz1\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = getpgid(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x110, 0xffffffffffffffff, 0x8000000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, r1) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x3, 0xca, 0xca30}) creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, 0x0}) fstatfs(r2, &(0x7f0000000400)=""/128) 03:46:58 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1055.046340] loop1: p1 < > p4 [ 1055.068404] loop1: partition table partially beyond EOD, truncated [ 1055.102421] hfs: can't find a HFS filesystem on dev loop5 03:46:58 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:46:58 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4800, 0x0) [ 1055.139282] loop1: p1 size 2 extends beyond EOD, truncated 03:46:58 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffdfc, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1055.288067] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1055.494078] net_ratelimit: 14 callbacks suppressed [ 1055.494086] protocol 88fb is buggy, dev hsr_slave_0 [ 1055.499117] protocol 88fb is buggy, dev hsr_slave_1 [ 1055.508627] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1055.509284] protocol 88fb is buggy, dev hsr_slave_0 [ 1055.520665] protocol 88fb is buggy, dev hsr_slave_1 [ 1055.563849] loop5: p1 < > p4 [ 1055.604940] IPv6: : Disabled Multicast RS [ 1055.693359] loop5: p4 start 1854537728 is beyond EOD, truncated 03:46:59 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\n\x00', @ifru_flags}) 03:46:59 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 03:46:59 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:46:59 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffdfd, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1055.912431] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:46:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1056.011907] IPVS: ftp: loaded support on port[0] = 21 03:46:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) r4 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r4, &(0x7f00000027c0)={&(0x7f0000000280)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b8000000000000002900000039000000c902020100ff3a06fe80000000000000b87f25f8fba8cac171df2a488c992ef8b0264f3701c721001000000000000096d7733293fa6aaf6e76630f5e4fccdc3ecc2df4213ef4b493fe8f8a11a850b7340000000000000000111552f05ddb342e4c775364bcc31f2c4ed052bfc80010000000000000c2f52ef0f49558970f1bf0d7e400000000397608005ab3a3bfb87d7eb09576071f00d9c53b508e0ae7dbc2f3c7f32200000000"], 0xb8}, 0x0) close(r1) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000300)) recvmsg$kcm(r2, &(0x7f000000d840)={0x0, 0x0, &(0x7f000000d700), 0x0, &(0x7f000000d740)=""/213, 0xd5}, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:46:59 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1056.178733] loop1: p1 < > p4 [ 1056.196892] loop1: partition table partially beyond EOD, truncated [ 1056.215702] loop1: p1 size 2 extends beyond EOD, truncated [ 1056.225439] hfs: can't find a HFS filesystem on dev loop5 03:46:59 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffff6, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1056.285494] loop1: p4 start 1854537728 is beyond EOD, truncated 03:46:59 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) [ 1056.443534] loop5: p1 < > p4 [ 1056.491023] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1056.512213] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1056.534153] protocol 88fb is buggy, dev hsr_slave_0 [ 1056.539314] protocol 88fb is buggy, dev hsr_slave_1 [ 1056.544491] protocol 88fb is buggy, dev hsr_slave_0 [ 1056.549562] protocol 88fb is buggy, dev hsr_slave_1 03:46:59 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0) [ 1056.634352] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1056.704045] protocol 88fb is buggy, dev hsr_slave_0 [ 1056.709209] protocol 88fb is buggy, dev hsr_slave_1 03:46:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:00 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1056.992473] loop1: p1 < > p4 [ 1057.019914] loop1: partition table partially beyond EOD, truncated [ 1057.061864] hfs: can't find a HFS filesystem on dev loop5 [ 1057.076376] loop1: p1 size 2 extends beyond EOD, truncated [ 1057.135106] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1057.296956] loop5: p1 < > p4 [ 1057.349376] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1057.359001] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1057.400326] IPv6: : Disabled Multicast RS [ 1057.479050] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:47:00 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x03\x10\x00', @ifru_flags}) 03:47:00 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000040)) 03:47:00 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x225c17d03, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:00 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:47:00 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0) 03:47:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:00 executing program 0: [ 1057.716499] IPVS: ftp: loaded support on port[0] = 21 [ 1057.775463] loop1: p1 < > p4 [ 1057.798680] loop1: partition table partially beyond EOD, truncated [ 1057.880330] hfs: can't find a HFS filesystem on dev loop5 [ 1057.894442] loop1: p1 size 2 extends beyond EOD, truncated 03:47:01 executing program 0: 03:47:01 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1057.955379] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1058.071149] loop5: p1 < > p4 [ 1058.089846] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 03:47:01 executing program 1: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0) 03:47:01 executing program 0: [ 1058.221900] loop5: p4 start 1854537728 is beyond EOD, truncated 03:47:01 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7ffffffffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1058.411691] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 1058.590074] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1058.616640] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1058.846036] IPv6: : Disabled Multicast RS 03:47:02 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x01\x16\x00', @ifru_flags}) 03:47:02 executing program 0: 03:47:02 executing program 1: 03:47:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:02 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x100000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:02 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1059.048060] hfs: can't find a HFS filesystem on dev loop5 03:47:02 executing program 0: [ 1059.098613] IPVS: ftp: loaded support on port[0] = 21 03:47:02 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2000000}) 03:47:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 03:47:02 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x200000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1059.313680] loop5: p1 < > p4 03:47:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0xfffffd7e) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = accept(r1, &(0x7f0000000740)=@alg, &(0x7f00000007c0)=0x80) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000800)=0x210000, 0x4) r3 = getpid() r4 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) sendto(r2, &(0x7f0000000240)="ed852645ff9342bd9c31622a3ff64f2296bcdfd79ff823a963ae5651dafa33f27d36374daee61619dd49165610517a124b09c8af60e1b97e4534739bdd0af8f89d1754781db49a6637e1e677d9e9520a537c08d06c42467f3a7af9e5f1b268ad9a0e350bf563646864d210c214385adc2bb1fd2d506b88480ed71131ab073f8f7df6ec2b216800abb7ebf98ca113f20df6bf45474f5f7c3f3225995b777429d4a6ca5f1d1aa479f996a1bf379d1bef6c825a278ef33220dcd7e2ae590ba197b4f0a9ab51a094820c5d4b09e3e64a9b4e5a95cf13c172cd1e7b804fb55c0ed4621cef683209a4081ae1d3", 0xea, 0x40000, 0x0, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={r3, r4, r5}, 0xc) socketpair(0x1, 0x3, 0x6, &(0x7f00000001c0)={0xffffffffffffffff}) bind$rds(r6, &(0x7f0000000200)={0x2, 0x4e21, @multicast1}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2}, 0x20) [ 1059.391109] loop5: p4 start 1854537728 is beyond EOD, truncated 03:47:02 executing program 0: fremovexattr(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 1059.523425] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1060.073364] IPv6: : Disabled Multicast RS 03:47:03 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x0f\x1a\x00', @ifru_flags}) 03:47:03 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x300000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:03 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x9000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:03 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000680)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1205531, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r1}}, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000500), &(0x7f0000000540)=0x8) getgroups(0x3, &(0x7f0000000800)=[0xee00, 0x0, 0xee01]) socket$bt_hidp(0x1f, 0x3, 0x6) 03:47:03 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0) 03:47:03 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1060.181002] print_req_error: 56 callbacks suppressed [ 1060.181014] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 1060.199187] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.205694] buffer_io_error: 50 callbacks suppressed [ 1060.205704] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.223652] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.230276] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.260705] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.267400] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.275559] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.282108] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.290179] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.296767] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.304259] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.317908] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.325657] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.332200] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.339833] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.346422] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.354013] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1060.360577] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1060.368200] Buffer I/O error on dev loop5p1, logical block 0, async page read 03:47:03 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0) [ 1060.392932] IPVS: ftp: loaded support on port[0] = 21 03:47:03 executing program 1: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\b\x00', @ifru_flags}) [ 1060.575227] loop5: p1 < > p4 03:47:03 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x37dc12502000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:03 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0) [ 1060.616255] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1060.695658] net_ratelimit: 12 callbacks suppressed [ 1060.695733] protocol 88fb is buggy, dev hsr_slave_0 [ 1060.706595] protocol 88fb is buggy, dev hsr_slave_1 [ 1060.713435] protocol 88fb is buggy, dev hsr_slave_0 [ 1060.719303] protocol 88fb is buggy, dev hsr_slave_1 [ 1060.729734] IPVS: ftp: loaded support on port[0] = 21 [ 1060.790424] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1060.854090] protocol 88fb is buggy, dev hsr_slave_0 [ 1060.859271] protocol 88fb is buggy, dev hsr_slave_1 03:47:04 executing program 0 (fault-call:5 fault-nth:0): ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:04 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x400000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1061.507311] IPv6: : Disabled Multicast RS 03:47:04 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x1f\x00', @ifru_flags}) 03:47:04 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:04 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x600000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:04 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:04 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1061.704353] IPv6: : Disabled Multicast RS [ 1061.833888] IPVS: ftp: loaded support on port[0] = 21 03:47:04 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1061.861513] hfs: can't find a HFS filesystem on dev loop5 03:47:05 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x700000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:05 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x37dc12502000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:05 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:05 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1062.331830] hfs: can't find a HFS filesystem on dev loop1 03:47:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:05 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x800000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1062.570429] hfs: can't find a HFS filesystem on dev loop5 [ 1062.625386] loop1: p1 < > p4 [ 1062.685748] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1062.786874] loop5: p1 < > p4 [ 1062.849461] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1062.867087] IPv6: : Disabled Multicast RS [ 1062.886590] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1063.053203] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1063.223438] hfs: can't find a HFS filesystem on dev loop5 03:47:06 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:06 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:47:06 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:06 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:06 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x40000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:06 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00 \x00', @ifru_flags}) [ 1063.507413] FAULT_INJECTION: forcing a failure. [ 1063.507413] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.564226] hfs: can't find a HFS filesystem on dev loop5 [ 1063.574132] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.579268] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.625787] CPU: 1 PID: 3082 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #86 [ 1063.633027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1063.642396] Call Trace: [ 1063.645013] dump_stack+0x172/0x1f0 [ 1063.648664] should_fail.cold+0xa/0x1b [ 1063.652576] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1063.657700] ? lock_downgrade+0x810/0x810 [ 1063.661876] ? ___might_sleep+0x163/0x280 [ 1063.666049] __should_failslab+0x121/0x190 [ 1063.670306] should_failslab+0x9/0x14 [ 1063.674130] __kmalloc_track_caller+0x2d8/0x740 [ 1063.678820] ? __local_bh_enable_ip+0x15a/0x270 [ 1063.683514] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1063.688118] ? lock_sock_nested+0x9a/0x120 [ 1063.692383] ? trace_hardirqs_on+0x67/0x230 [ 1063.696871] ? rxrpc_request_key+0x48/0x110 [ 1063.701230] memdup_user_nul+0x26/0x130 [ 1063.705230] rxrpc_request_key+0x48/0x110 [ 1063.709399] rxrpc_setsockopt+0x67d/0x740 [ 1063.713671] ? rxrpc_getsockopt+0x140/0x140 [ 1063.718015] ? apparmor_socket_setsockopt+0x22/0x30 [ 1063.723049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1063.728610] ? security_socket_setsockopt+0x93/0xc0 [ 1063.733646] __sys_setsockopt+0x180/0x280 [ 1063.736941] IPVS: ftp: loaded support on port[0] = 21 [ 1063.737801] ? kernel_accept+0x310/0x310 [ 1063.747074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1063.751850] ? do_syscall_64+0x26/0x610 [ 1063.755836] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1063.761199] ? do_syscall_64+0x26/0x610 [ 1063.765190] __x64_sys_setsockopt+0xbe/0x150 [ 1063.769618] do_syscall_64+0x103/0x610 [ 1063.773527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1063.778729] RIP: 0033:0x457e29 [ 1063.781936] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1063.800961] RSP: 002b:00007f478a47cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1063.808687] RAX: ffffffffffffffda RBX: 00007f478a47cc90 RCX: 0000000000457e29 [ 1063.815970] RDX: 0000000000000001 RSI: 0000000000000110 RDI: 0000000000000004 03:47:06 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1063.823354] RBP: 000000000073bf00 R08: 0000000000000009 R09: 0000000000000000 [ 1063.830641] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f478a47d6d4 [ 1063.837924] R13: 00000000004c5831 R14: 00000000004d9a40 R15: 0000000000000005 [ 1063.845535] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.850612] protocol 88fb is buggy, dev hsr_slave_1 03:47:07 executing program 1 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:07 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f00000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1063.983744] loop5: p1 < > p4 03:47:07 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1064.035784] loop5: p4 start 1854537728 is beyond EOD, truncated 03:47:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1064.197023] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:47:07 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x300, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:07 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:47:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x10f, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:07 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x40030000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:07 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4003000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:07 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x340, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1064.714187] hfs: can't find a HFS filesystem on dev loop5 [ 1064.931924] loop5: p1 < > p4 03:47:08 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x01&\x00', @ifru_flags}) 03:47:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x2, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:08 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x500, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:08 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8000000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1065.008484] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1065.126543] IPVS: ftp: loaded support on port[0] = 21 03:47:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x3, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1065.161932] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 03:47:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x4, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:08 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f00, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1065.694840] print_req_error: 34 callbacks suppressed [ 1065.694852] print_req_error: I/O error, dev loop5, sector 0 flags 80700 03:47:08 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:47:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x5, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:08 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf6ffffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:08 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4003, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1065.744234] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1065.750882] buffer_io_error: 30 callbacks suppressed [ 1065.750893] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1065.766165] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1065.772974] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1065.791717] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1065.798438] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1065.806708] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1065.813358] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1065.822931] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1065.829502] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1065.837531] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1065.844121] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1066.266571] IPv6: : Disabled Multicast RS 03:47:09 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x03*\x00', @ifru_flags}) 03:47:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0xf, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:09 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:09 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfcfdffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfcfdffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1066.508799] hfs: can't find a HFS filesystem on dev loop5 [ 1066.591487] IPVS: ftp: loaded support on port[0] = 21 03:47:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x10, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1066.739199] [ 1066.740905] ====================================================== [ 1066.747243] WARNING: possible circular locking dependency detected [ 1066.753567] 5.0.0-rc7+ #86 Not tainted [ 1066.757468] ------------------------------------------------------ [ 1066.763796] syz-executor.0/3291 is trying to acquire lock: [ 1066.769419] 00000000e83d0081 (&mm->mmap_sem){++++}, at: __do_page_fault+0x9c2/0xd60 [ 1066.777340] [ 1066.777340] but task is already holding lock: [ 1066.783314] 000000009691b69b (&sb->s_type->i_mutex_key#12){+.+.}, at: generic_file_write_iter+0xdf/0x610 [ 1066.793036] [ 1066.793036] which lock already depends on the new lock. [ 1066.793036] [ 1066.801358] [ 1066.801358] the existing dependency chain (in reverse order) is: [ 1066.808989] [ 1066.808989] -> #2 (&sb->s_type->i_mutex_key#12){+.+.}: [ 1066.815780] down_write+0x38/0x90 [ 1066.819771] shmem_fallocate+0x15a/0xc60 [ 1066.824475] ashmem_shrink_scan+0x1d7/0x4f0 [ 1066.829337] ashmem_ioctl+0x2f0/0x11a0 [ 1066.833766] do_vfs_ioctl+0xd6e/0x1390 [ 1066.838189] ksys_ioctl+0xab/0xd0 [ 1066.842183] __x64_sys_ioctl+0x73/0xb0 [ 1066.846605] do_syscall_64+0x103/0x610 [ 1066.851025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1066.856736] [ 1066.856736] -> #1 (ashmem_mutex){+.+.}: [ 1066.862212] __mutex_lock+0xf7/0x1310 [ 1066.866546] mutex_lock_nested+0x16/0x20 [ 1066.871141] ashmem_mmap+0x55/0x520 [ 1066.875314] mmap_region+0xc37/0x1760 [ 1066.879736] do_mmap+0x8e2/0x1080 [ 1066.883721] vm_mmap_pgoff+0x1c5/0x230 [ 1066.888156] ksys_mmap_pgoff+0x4aa/0x630 [ 1066.892784] __x64_sys_mmap+0xe9/0x1b0 [ 1066.897203] do_syscall_64+0x103/0x610 [ 1066.901623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1066.907332] [ 1066.907332] -> #0 (&mm->mmap_sem){++++}: [ 1066.912891] lock_acquire+0x16f/0x3f0 [ 1066.917229] down_read+0x3b/0x90 [ 1066.921137] __do_page_fault+0x9c2/0xd60 [ 1066.925745] do_page_fault+0x71/0x581 [ 1066.930079] page_fault+0x1e/0x30 [ 1066.934072] iov_iter_fault_in_readable+0x1ba/0x450 [ 1066.939624] generic_perform_write+0x195/0x530 [ 1066.944741] __generic_file_write_iter+0x25e/0x630 [ 1066.950202] generic_file_write_iter+0x360/0x610 [ 1066.955498] __vfs_write+0x613/0x8e0 [ 1066.959750] vfs_write+0x20c/0x580 [ 1066.963824] ksys_pwrite64+0x183/0x1c0 [ 1066.968243] __x64_sys_pwrite64+0x97/0xf0 [ 1066.972925] do_syscall_64+0x103/0x610 [ 1066.977346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1066.983060] [ 1066.983060] other info that might help us debug this: [ 1066.983060] [ 1066.991214] Chain exists of: [ 1066.991214] &mm->mmap_sem --> ashmem_mutex --> &sb->s_type->i_mutex_key#12 [ 1066.991214] [ 1067.002763] Possible unsafe locking scenario: [ 1067.002763] [ 1067.008839] CPU0 CPU1 [ 1067.013515] ---- ---- [ 1067.018190] lock(&sb->s_type->i_mutex_key#12); [ 1067.022953] lock(ashmem_mutex); [ 1067.028927] lock(&sb->s_type->i_mutex_key#12); [ 1067.036206] lock(&mm->mmap_sem); [ 1067.039752] [ 1067.039752] *** DEADLOCK *** [ 1067.039752] [ 1067.046187] 2 locks held by syz-executor.0/3291: [ 1067.050946] #0: 00000000c2b3c2f5 (sb_writers#5){.+.+}, at: vfs_write+0x429/0x580 [ 1067.058600] #1: 000000009691b69b (&sb->s_type->i_mutex_key#12){+.+.}, at: generic_file_write_iter+0xdf/0x610 [ 1067.068683] [ 1067.068683] stack backtrace: [ 1067.073191] CPU: 0 PID: 3291 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #86 [ 1067.080385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.089756] Call Trace: [ 1067.092361] dump_stack+0x172/0x1f0 [ 1067.096008] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1067.101385] __lock_acquire+0x2f00/0x4700 [ 1067.105557] ? fixup_exception+0xad/0xe0 [ 1067.109637] ? mark_held_locks+0x100/0x100 [ 1067.113889] ? pgtable_bad+0x90/0x90 [ 1067.117610] ? mark_held_locks+0x100/0x100 [ 1067.121854] ? __lock_is_held+0xb6/0x140 [ 1067.125927] lock_acquire+0x16f/0x3f0 [ 1067.129735] ? __do_page_fault+0x9c2/0xd60 [ 1067.133979] down_read+0x3b/0x90 [ 1067.137356] ? __do_page_fault+0x9c2/0xd60 [ 1067.141600] __do_page_fault+0x9c2/0xd60 [ 1067.145670] do_page_fault+0x71/0x581 [ 1067.149530] page_fault+0x1e/0x30 [ 1067.153248] RIP: 0010:iov_iter_fault_in_readable+0x1ba/0x450 [ 1067.159053] Code: 4c 39 f3 76 17 eb 3b e8 54 2c 47 fe 48 81 c3 00 10 00 00 48 39 9d 68 ff ff ff 72 2d e8 3f 2c 47 fe 0f 1f 00 0f ae e8 45 31 f6 <8a> 13 0f 1f 00 31 ff 44 89 f6 41 88 57 d0 e8 a3 2d 47 fe 45 85 f6 [ 1067.177966] RSP: 0018:ffff88808cc7f9b8 EFLAGS: 00010246 [ 1067.183341] RAX: 0000000000040000 RBX: 0000000020010000 RCX: ffffc90005deb000 [ 1067.190621] RDX: 000000000000234e RSI: ffffffff8328b541 RDI: 0000000000000005 [ 1067.197890] RBP: ffff88808cc7fa58 R08: ffff888098520340 R09: fffff9400037977f [ 1067.205212] R10: fffff9400037977e R11: ffffea0001bcbbf7 R12: 0000000000000060 [ 1067.212578] R13: 0000000000000060 R14: 0000000000000000 R15: ffff88808cc7fa30 [ 1067.219855] ? iov_iter_fault_in_readable+0x1b1/0x450 [ 1067.225060] ? iov_iter_fault_in_readable+0x1b1/0x450 [ 1067.230261] ? copy_page_from_iter+0x750/0x750 [ 1067.234844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1067.240395] generic_perform_write+0x195/0x530 [ 1067.244989] ? page_endio+0x780/0x780 [ 1067.248792] ? current_time+0x140/0x140 [ 1067.252765] ? retint_kernel+0x2d/0x2d [ 1067.256652] __generic_file_write_iter+0x25e/0x630 [ 1067.261587] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1067.266606] generic_file_write_iter+0x360/0x610 [ 1067.271374] ? __generic_file_write_iter+0x630/0x630 [ 1067.276490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1067.282032] ? iov_iter_init+0xea/0x220 [ 1067.286022] __vfs_write+0x613/0x8e0 [ 1067.289733] ? kernel_read+0x120/0x120 [ 1067.293622] ? rcu_read_lock_sched_held+0x110/0x130 [ 1067.298634] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1067.303394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1067.308932] ? __sb_start_write+0x1ac/0x360 [ 1067.313258] vfs_write+0x20c/0x580 [ 1067.316799] ksys_pwrite64+0x183/0x1c0 [ 1067.320683] ? __ia32_sys_pread64+0xf0/0xf0 [ 1067.324997] ? retint_kernel+0x2d/0x2d [ 1067.328890] __x64_sys_pwrite64+0x97/0xf0 [ 1067.333041] ? do_syscall_64+0x5b/0x610 [ 1067.337014] do_syscall_64+0x103/0x610 [ 1067.340898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1067.346080] RIP: 0033:0x411f77 [ 1067.349271] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1067.355266] IPVS: ftp: loaded support on port[0] = 21 [ 1067.368171] RSP: 002b:00007fb23b585a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1067.368182] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000411f77 03:47:10 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1067.368189] RDX: 0000000000000060 RSI: 0000000020010000 RDI: 0000000000000005 [ 1067.368195] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1067.368202] R10: 00000000000001a0 R11: 0000000000000293 R12: 00007fb23b5866d4 [ 1067.368209] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000000000000 [ 1067.370378] kobject: 'tx-0' (0000000098aca43f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1067.410774] kobject: 'loop3' (0000000063865547): kobject_uevent_env 03:47:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0xffffff1f, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:10 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfdfdffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1067.445937] kobject: 'tx-0' (0000000098aca43f): kobject_uevent_env [ 1067.453217] kobject: 'tx-0' (0000000098aca43f): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1067.464725] kobject: 'tunl0' (000000006046fc52): kobject_add_internal: parent: 'net', set: 'devices' [ 1067.475374] kobject: 'tunl0' (000000006046fc52): kobject_uevent_env [ 1067.482038] kobject: 'tunl0' (000000006046fc52): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1067.493493] kobject: 'holders' (0000000074d225e6): kobject_cleanup, parent 00000000b284420c [ 1067.496005] kobject: 'loop3' (0000000063865547): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1067.506527] kobject: 'holders' (0000000074d225e6): auto cleanup kobject_del [ 1067.514762] kobject: 'loop1' (00000000243dd996): kobject_uevent_env [ 1067.528859] kobject: 'queues' (00000000355a821e): kobject_add_internal: parent: 'tunl0', set: '' [ 1067.539708] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1067.553548] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1067.561759] kobject: 'queues' (00000000355a821e): kobject_uevent_env [ 1067.570983] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1067.579606] kobject: 'holders' (0000000074d225e6): calling ktype release 03:47:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x02', 0x9) [ 1067.580619] kobject: 'queues' (00000000355a821e): kobject_uevent_env: filter function caused the event to drop! [ 1067.611706] kobject: 'rx-0' (0000000022e134f1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1067.623477] kobject: 'rx-0' (0000000022e134f1): kobject_uevent_env [ 1067.631644] kobject: 'rx-0' (0000000022e134f1): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1067.645063] kobject: 'tx-0' (00000000e3967eca): kobject_add_internal: parent: 'queues', set: 'queues' [ 1067.656447] kobject: 'tx-0' (00000000e3967eca): kobject_uevent_env [ 1067.662864] kobject: 'tx-0' (00000000e3967eca): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1067.673267] kobject: (0000000074d225e6): dynamic_kobj_release [ 1067.673279] kobject: 'holders': free name [ 1067.679445] kobject: 'loop1' (00000000243dd996): kobject_uevent_env 03:47:10 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfeffffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1067.702542] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1067.711665] kobject: 'loop5p1' (00000000b284420c): kobject_uevent_env [ 1067.726312] kobject: 'loop5p1' (00000000b284420c): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1' [ 1067.733028] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1067.736744] net_ratelimit: 10 callbacks suppressed 03:47:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x05', 0x9) [ 1067.736752] protocol 88fb is buggy, dev hsr_slave_0 [ 1067.736786] protocol 88fb is buggy, dev hsr_slave_1 [ 1067.742891] loop5: p1 < > p4 [ 1067.763165] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1067.773314] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1067.785761] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1067.801365] kobject: 'gre0' (00000000332685f6): kobject_add_internal: parent: 'net', set: 'devices' [ 1067.811212] kobject: 'loop5p1' (00000000b284420c): kobject_cleanup, parent (null) [ 1067.811347] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1067.824160] kobject: 'loop5p1' (00000000b284420c): calling ktype release [ 1067.829964] kobject: 'loop5p1' (000000002f458039): kobject_add_internal: parent: 'loop5', set: 'devices' [ 1067.836252] kobject: 'loop5p1': free name [ 1067.855105] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1067.868082] kobject: 'gre0' (00000000332685f6): kobject_uevent_env [ 1067.868353] kobject: 'loop5p1' (000000002f458039): kobject_uevent_env [ 1067.896800] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1067.903264] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1067.917311] kobject: 'loop5p1' (000000002f458039): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1067.925214] kobject: 'gre0' (00000000332685f6): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1067.934048] kobject: 'holders' (00000000acdc2933): kobject_add_internal: parent: 'loop5p1', set: '' [ 1067.941666] kobject: 'queues' (000000000593458a): kobject_add_internal: parent: 'gre0', set: '' [ 1067.950496] kobject: 'loop1' (00000000243dd996): kobject_uevent_env [ 1067.959022] kobject: 'queues' (000000000593458a): kobject_uevent_env [ 1067.966975] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1067.969815] kobject: 'queues' (000000000593458a): kobject_uevent_env: filter function caused the event to drop! [ 1067.978750] protocol 88fb is buggy, dev hsr_slave_0 [ 1067.978783] protocol 88fb is buggy, dev hsr_slave_1 [ 1067.978823] kobject: 'loop5p1' (000000002f458039): kobject_uevent_env [ 1067.978849] protocol 88fb is buggy, dev hsr_slave_0 [ 1067.978858] kobject: 'loop5p1' (000000002f458039): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1' [ 1067.978880] protocol 88fb is buggy, dev hsr_slave_1 [ 1067.978983] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1067.992022] kobject: 'rx-0' (000000001197cd2f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.065003] kobject: 'rx-0' (000000001197cd2f): kobject_uevent_env [ 1068.071554] kobject: 'rx-0' (000000001197cd2f): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1068.082134] kobject: 'tx-0' (000000001605d2bd): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.091856] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1068.093663] kobject: 'tx-0' (000000001605d2bd): kobject_uevent_env [ 1068.098581] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1068.107194] kobject: 'tx-0' (000000001605d2bd): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1068.115165] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1068.164862] kobject: 'gretap0' (0000000019d467a9): kobject_add_internal: parent: 'net', set: 'devices' [ 1068.177510] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 1068.185743] kobject: 'gretap0' (0000000019d467a9): kobject_uevent_env [ 1068.187676] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1068.192395] kobject: 'gretap0' (0000000019d467a9): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 1068.192475] kobject: 'queues' (00000000bfab2299): kobject_add_internal: parent: 'gretap0', set: '' [ 1068.199383] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1068.225265] kobject: 'queues' (00000000bfab2299): kobject_uevent_env [ 1068.232318] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1068.238764] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1068.244420] kobject: 'queues' (00000000bfab2299): kobject_uevent_env: filter function caused the event to drop! [ 1068.256638] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1068.266578] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1068.286931] kobject: 'rx-0' (00000000c779e6cf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.303837] kobject: 'rx-0' (00000000c779e6cf): kobject_uevent_env [ 1068.312935] kobject: 'rx-0' (00000000c779e6cf): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 1068.323804] kobject: 'tx-0' (00000000c5ca60ca): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.336208] kobject: 'tx-0' (00000000c5ca60ca): kobject_uevent_env [ 1068.343036] kobject: 'tx-0' (00000000c5ca60ca): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 1068.356843] kobject: 'batman_adv' (000000008362912b): kobject_add_internal: parent: 'gretap0', set: '' [ 1068.367356] kobject: 'loop3' (0000000063865547): kobject_uevent_env [ 1068.369590] kobject: 'erspan0' (00000000d2f404ea): kobject_add_internal: parent: 'net', set: 'devices' [ 1068.384959] kobject: 'loop3' (0000000063865547): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1068.385918] kobject: 'erspan0' (00000000d2f404ea): kobject_uevent_env [ 1068.404587] kobject: 'erspan0' (00000000d2f404ea): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 1068.437309] kobject: 'queues' (00000000d97b857a): kobject_add_internal: parent: 'erspan0', set: '' [ 1068.447399] kobject: 'queues' (00000000d97b857a): kobject_uevent_env [ 1068.459356] kobject: 'queues' (00000000d97b857a): kobject_uevent_env: filter function caused the event to drop! [ 1068.469967] kobject: 'rx-0' (000000001dbb3b18): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.482537] kobject: 'rx-0' (000000001dbb3b18): kobject_uevent_env [ 1068.489227] kobject: 'rx-0' (000000001dbb3b18): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 1068.502716] kobject: 'tx-0' (000000008d7e3fab): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.512256] kobject: 'tx-0' (000000008d7e3fab): kobject_uevent_env [ 1068.518628] kobject: 'tx-0' (000000008d7e3fab): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 1068.529611] kobject: 'batman_adv' (0000000084d7cd78): kobject_add_internal: parent: 'erspan0', set: '' [ 1068.542754] kobject: 'ip_vti0' (00000000c9dd5292): kobject_add_internal: parent: 'net', set: 'devices' [ 1068.555933] kobject: 'ip_vti0' (00000000c9dd5292): kobject_uevent_env [ 1068.562749] kobject: 'ip_vti0' (00000000c9dd5292): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 1068.573521] kobject: 'queues' (000000002cba5430): kobject_add_internal: parent: 'ip_vti0', set: '' [ 1068.585647] kobject: 'queues' (000000002cba5430): kobject_uevent_env [ 1068.592214] kobject: 'queues' (000000002cba5430): kobject_uevent_env: filter function caused the event to drop! [ 1068.603005] kobject: 'rx-0' (00000000a750758f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.614946] kobject: 'rx-0' (00000000a750758f): kobject_uevent_env [ 1068.621377] kobject: 'rx-0' (00000000a750758f): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1068.633165] kobject: 'tx-0' (00000000fc742aaa): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.645136] kobject: 'tx-0' (00000000fc742aaa): kobject_uevent_env [ 1068.651553] kobject: 'tx-0' (00000000fc742aaa): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 1068.665176] kobject: 'ip6_vti0' (0000000066777d82): kobject_add_internal: parent: 'net', set: 'devices' [ 1068.676797] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env [ 1068.683674] kobject: 'ip6_vti0' (0000000066777d82): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 1068.696392] kobject: 'queues' (0000000028e9c764): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 1068.706362] kobject: 'queues' (0000000028e9c764): kobject_uevent_env [ 1068.713020] kobject: 'queues' (0000000028e9c764): kobject_uevent_env: filter function caused the event to drop! [ 1068.726125] kobject: 'rx-0' (00000000838561bd): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.736515] kobject: 'rx-0' (00000000838561bd): kobject_uevent_env [ 1068.743110] kobject: 'rx-0' (00000000838561bd): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 1068.756287] kobject: 'tx-0' (00000000dbdb033f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.766346] kobject: 'tx-0' (00000000dbdb033f): kobject_uevent_env [ 1068.772938] kobject: 'tx-0' (00000000dbdb033f): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 1068.787526] kobject: 'sit0' (00000000595c109e): kobject_add_internal: parent: 'net', set: 'devices' [ 1068.797815] kobject: 'sit0' (00000000595c109e): kobject_uevent_env [ 1068.806799] kobject: 'sit0' (00000000595c109e): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 1068.816219] kobject: 'queues' (0000000025e932a3): kobject_add_internal: parent: 'sit0', set: '' [ 1068.828409] kobject: 'queues' (0000000025e932a3): kobject_uevent_env [ 1068.835128] kobject: 'queues' (0000000025e932a3): kobject_uevent_env: filter function caused the event to drop! [ 1068.848144] kobject: 'rx-0' (000000005a6c8c98): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.857670] kobject: 'rx-0' (000000005a6c8c98): kobject_uevent_env [ 1068.864169] kobject: 'rx-0' (000000005a6c8c98): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 1068.874464] kobject: 'tx-0' (000000008d152d30): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.884087] kobject: 'tx-0' (000000008d152d30): kobject_uevent_env [ 1068.890511] kobject: 'tx-0' (000000008d152d30): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 1068.901495] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_add_internal: parent: 'net', set: 'devices' [ 1068.911458] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env [ 1068.918150] kobject: 'ip6tnl0' (00000000dfcd519a): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 1068.927915] kobject: 'queues' (00000000f66fc7fe): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 1068.937722] kobject: 'queues' (00000000f66fc7fe): kobject_uevent_env [ 1068.944321] kobject: 'queues' (00000000f66fc7fe): kobject_uevent_env: filter function caused the event to drop! [ 1068.954702] kobject: 'rx-0' (00000000d711ad18): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.964237] kobject: 'rx-0' (00000000d711ad18): kobject_uevent_env [ 1068.970640] kobject: 'rx-0' (00000000d711ad18): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 1068.981189] kobject: 'tx-0' (00000000fcdb9728): kobject_add_internal: parent: 'queues', set: 'queues' [ 1068.990774] kobject: 'tx-0' (00000000fcdb9728): kobject_uevent_env [ 1068.997199] kobject: 'tx-0' (00000000fcdb9728): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 1069.008441] kobject: 'ip6gre0' (000000009ef06026): kobject_add_internal: parent: 'net', set: 'devices' [ 1069.018645] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env [ 1069.025387] kobject: 'ip6gre0' (000000009ef06026): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 1069.035162] kobject: 'queues' (00000000cdc067a4): kobject_add_internal: parent: 'ip6gre0', set: '' [ 1069.044908] kobject: 'queues' (00000000cdc067a4): kobject_uevent_env [ 1069.051484] kobject: 'queues' (00000000cdc067a4): kobject_uevent_env: filter function caused the event to drop! [ 1069.061823] kobject: 'rx-0' (0000000034f3384e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1069.071296] kobject: 'rx-0' (0000000034f3384e): kobject_uevent_env [ 1069.077779] kobject: 'rx-0' (0000000034f3384e): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 1069.088349] kobject: 'tx-0' (00000000e9c53faf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1069.097894] kobject: 'tx-0' (00000000e9c53faf): kobject_uevent_env [ 1069.104355] kobject: 'tx-0' (00000000e9c53faf): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 1069.284906] kobject: 'rx-0' (0000000034f3384e): kobject_cleanup, parent 00000000cdc067a4 [ 1069.293182] kobject: 'rx-0' (0000000034f3384e): auto cleanup 'remove' event [ 1069.300332] kobject: 'rx-0' (0000000034f3384e): kobject_uevent_env [ 1069.306702] kobject: 'rx-0' (0000000034f3384e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.317061] kobject: 'rx-0' (0000000034f3384e): auto cleanup kobject_del [ 1069.323918] kobject: 'rx-0' (0000000034f3384e): calling ktype release [ 1069.330561] kobject: 'rx-0': free name [ 1069.334673] kobject: 'tx-0' (00000000e9c53faf): kobject_cleanup, parent 00000000cdc067a4 [ 1069.342913] kobject: 'tx-0' (00000000e9c53faf): auto cleanup 'remove' event [ 1069.350071] kobject: 'tx-0' (00000000e9c53faf): kobject_uevent_env [ 1069.356423] kobject: 'tx-0' (00000000e9c53faf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.366508] kobject: 'tx-0' (00000000e9c53faf): auto cleanup kobject_del [ 1069.373381] kobject: 'tx-0' (00000000e9c53faf): calling ktype release [ 1069.380002] kobject: 'tx-0': free name [ 1069.383901] kobject: 'queues' (00000000cdc067a4): kobject_cleanup, parent (null) [ 1069.392348] kobject: 'queues' (00000000cdc067a4): calling ktype release [ 1069.399129] kobject: 'queues' (00000000cdc067a4): kset_release [ 1069.405143] kobject: 'queues': free name [ 1069.409399] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env [ 1069.424033] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.435030] kobject: 'rx-0' (000000004d72e0b6): kobject_cleanup, parent 0000000047d349a5 [ 1069.443270] kobject: 'rx-0' (000000004d72e0b6): auto cleanup 'remove' event [ 1069.450668] kobject: 'rx-0' (000000004d72e0b6): kobject_uevent_env [ 1069.457039] kobject: 'rx-0' (000000004d72e0b6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.467123] kobject: 'rx-0' (000000004d72e0b6): auto cleanup kobject_del [ 1069.474020] kobject: 'rx-0' (000000004d72e0b6): calling ktype release [ 1069.480599] kobject: 'rx-0': free name [ 1069.484546] kobject: 'tx-0' (00000000a1fdc71b): kobject_cleanup, parent 0000000047d349a5 [ 1069.492776] kobject: 'tx-0' (00000000a1fdc71b): auto cleanup 'remove' event [ 1069.500695] kobject: 'tx-0' (00000000a1fdc71b): kobject_uevent_env [ 1069.507200] kobject: 'tx-0' (00000000a1fdc71b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.517485] kobject: 'tx-0' (00000000a1fdc71b): auto cleanup kobject_del [ 1069.524771] kobject: 'tx-0' (00000000a1fdc71b): calling ktype release [ 1069.531430] kobject: 'tx-0': free name [ 1069.535413] kobject: 'queues' (0000000047d349a5): kobject_cleanup, parent (null) [ 1069.543860] kobject: 'queues' (0000000047d349a5): calling ktype release [ 1069.550735] kobject: 'queues' (0000000047d349a5): kset_release [ 1069.556799] kobject: 'queues': free name [ 1069.561194] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_uevent_env [ 1069.567890] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.579068] kobject: 'rx-0' (00000000d1c17751): kobject_cleanup, parent 0000000099de11d2 [ 1069.587417] kobject: 'rx-0' (00000000d1c17751): auto cleanup 'remove' event [ 1069.594623] kobject: 'rx-0' (00000000d1c17751): kobject_uevent_env [ 1069.600994] kobject: 'rx-0' (00000000d1c17751): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.611160] kobject: 'rx-0' (00000000d1c17751): auto cleanup kobject_del [ 1069.618106] kobject: 'rx-0' (00000000d1c17751): calling ktype release [ 1069.624793] kobject: 'rx-0': free name [ 1069.628796] kobject: 'tx-0' (00000000505813aa): kobject_cleanup, parent 0000000099de11d2 [ 1069.637126] kobject: 'tx-0' (00000000505813aa): auto cleanup 'remove' event [ 1069.644327] kobject: 'tx-0' (00000000505813aa): kobject_uevent_env [ 1069.650722] kobject: 'tx-0' (00000000505813aa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.660870] kobject: 'tx-0' (00000000505813aa): auto cleanup kobject_del [ 1069.667822] kobject: 'tx-0' (00000000505813aa): calling ktype release [ 1069.674508] kobject: 'tx-0': free name [ 1069.678461] kobject: 'queues' (0000000099de11d2): kobject_cleanup, parent (null) [ 1069.686969] kobject: 'queues' (0000000099de11d2): calling ktype release [ 1069.693798] kobject: 'queues' (0000000099de11d2): kset_release [ 1069.699880] kobject: 'queues': free name [ 1069.704355] kobject: 'ip6gre0' (0000000071751cd6): kobject_uevent_env [ 1069.711038] kobject: 'ip6gre0' (0000000071751cd6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.722046] kobject: 'rx-0' (00000000cf4dcc9f): kobject_cleanup, parent 00000000691d0245 [ 1069.730388] kobject: 'rx-0' (00000000cf4dcc9f): auto cleanup 'remove' event [ 1069.737555] kobject: 'rx-0' (00000000cf4dcc9f): kobject_uevent_env [ 1069.744015] kobject: 'rx-0' (00000000cf4dcc9f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.754160] kobject: 'rx-0' (00000000cf4dcc9f): auto cleanup kobject_del [ 1069.761064] kobject: 'rx-0' (00000000cf4dcc9f): calling ktype release [ 1069.768062] kobject: 'rx-0': free name [ 1069.771985] kobject: 'tx-0' (00000000a02b2615): kobject_cleanup, parent 00000000691d0245 [ 1069.780322] kobject: 'tx-0' (00000000a02b2615): auto cleanup 'remove' event [ 1069.787509] kobject: 'tx-0' (00000000a02b2615): kobject_uevent_env [ 1069.793873] kobject: 'tx-0' (00000000a02b2615): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.804065] kobject: 'tx-0' (00000000a02b2615): auto cleanup kobject_del [ 1069.810999] kobject: 'tx-0' (00000000a02b2615): calling ktype release [ 1069.817699] kobject: 'tx-0': free name [ 1069.821676] kobject: 'queues' (00000000691d0245): kobject_cleanup, parent (null) [ 1069.830178] kobject: 'queues' (00000000691d0245): calling ktype release [ 1069.837008] kobject: 'queues' (00000000691d0245): kset_release [ 1069.843067] kobject: 'queues': free name [ 1069.847373] kobject: 'ip6gre0' (000000004849e330): kobject_uevent_env [ 1069.854070] kobject: 'ip6gre0' (000000004849e330): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.914245] kobject: 'ip6gre0' (000000009ef06026): kobject_cleanup, parent (null) [ 1069.922758] kobject: 'ip6gre0' (000000009ef06026): auto cleanup 'remove' event [ 1069.930221] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env [ 1069.937199] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1069.947646] kobject: 'ip6gre0' (000000009ef06026): calling ktype release [ 1069.954620] kobject: 'ip6gre0': free name 03:47:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x0f', 0x9) 03:47:13 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:13 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:13 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x01:\x00', @ifru_flags}) 03:47:13 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1069.958822] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_cleanup, parent (null) [ 1069.967452] kobject: 'ip6gre0' (00000000e87ca4f3): auto cleanup 'remove' event [ 1069.982917] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_uevent_env [ 1069.993109] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1070.005137] kobject: 'ip6gre0' (00000000e87ca4f3): calling ktype release [ 1070.021066] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1070.024367] kobject: 'loop4' (00000000c75b5a47): kobject_uevent_env [ 1070.029607] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1070.033934] kobject: 'loop4' (00000000c75b5a47): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1070.039134] kobject: 'ip6gre0': free name [ 1070.067105] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env 03:47:13 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1070.105145] IPVS: ftp: loaded support on port[0] = 21 [ 1070.123013] kobject: 'ip6gre0' (0000000071751cd6): kobject_cleanup, parent (null) [ 1070.132391] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1070.132489] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:47:13 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffffffffff0700, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1070.140908] kobject: 'ip6gre0' (0000000071751cd6): auto cleanup 'remove' event [ 1070.162860] kobject: 'lo' (00000000ad2ef11f): kobject_add_internal: parent: 'net', set: 'devices' [ 1070.173292] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1070.185421] kobject: 'ip6gre0' (0000000071751cd6): kobject_uevent_env [ 1070.192942] kobject: 'lo' (00000000ad2ef11f): kobject_uevent_env [ 1070.220765] kobject: 'ip6gre0' (0000000071751cd6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1070.233828] kobject: 'loop1' (00000000243dd996): kobject_uevent_env [ 1070.235846] kobject: 'ip6gre0' (0000000071751cd6): calling ktype release 03:47:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1070.265368] kobject: 'lo' (00000000ad2ef11f): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1070.269631] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1070.277843] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1070.286408] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1070.297117] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1070.301719] kobject: 'ip6gre0': free name 03:47:13 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1070.324454] kobject: 'queues' (00000000ce47fd24): kobject_add_internal: parent: 'lo', set: '' [ 1070.334129] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1070.371087] kobject: 'queues' (00000000ce47fd24): kobject_uevent_env [ 1070.379704] kobject: 'queues' (00000000ce47fd24): kobject_uevent_env: filter function caused the event to drop! [ 1070.402077] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1070.410918] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:47:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfeffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1070.419235] kobject: 'rx-0' (000000007215091a): kobject_add_internal: parent: 'queues', set: 'queues' 03:47:13 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1070.461738] kobject: 'rx-0' (000000007215091a): kobject_uevent_env [ 1070.466891] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1070.489324] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1070.497564] kobject: 'rx-0' (000000007215091a): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1070.512622] kobject: 'tx-0' (00000000b65830d4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1070.522515] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1070.525671] kobject: 'tx-0' (00000000b65830d4): kobject_uevent_env [ 1070.531094] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1070.537264] kobject: 'tx-0' (00000000b65830d4): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1070.558422] kobject: 'loop1' (00000000243dd996): kobject_uevent_env [ 1070.567900] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1070.593122] kobject: 'tunl0' (00000000b6c774d8): kobject_add_internal: parent: 'net', set: 'devices' 03:47:13 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffffffffffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1070.609261] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1070.618853] kobject: 'tunl0' (00000000b6c774d8): kobject_uevent_env [ 1070.628296] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1070.638462] kobject: 'tunl0' (00000000b6c774d8): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1070.660335] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1070.668034] kobject: 'queues' (00000000966559c7): kobject_add_internal: parent: 'tunl0', set: '' [ 1070.672192] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1070.681633] kobject: 'queues' (00000000966559c7): kobject_uevent_env [ 1070.697488] kobject: 'queues' (00000000966559c7): kobject_uevent_env: filter function caused the event to drop! [ 1070.705758] kobject: 'loop1' (00000000243dd996): kobject_uevent_env [ 1070.721278] kobject: 'rx-0' (000000002feed10b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1070.721698] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1070.732996] kobject: 'rx-0' (000000002feed10b): kobject_uevent_env [ 1070.740850] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1070.753829] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1070.772794] kobject: 'rx-0' (000000002feed10b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1070.784015] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1070.784311] kobject: 'tx-0' (0000000041b9bd43): kobject_add_internal: parent: 'queues', set: 'queues' [ 1070.790457] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1070.810458] kobject: 'tx-0' (0000000041b9bd43): kobject_uevent_env [ 1070.811317] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1070.818972] kobject: 'tx-0' (0000000041b9bd43): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1070.830482] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1070.838630] kobject: 'ip6gre0' (000000004849e330): kobject_cleanup, parent (null) [ 1070.854185] kobject: 'gre0' (00000000c9b706d6): kobject_add_internal: parent: 'net', set: 'devices' [ 1070.863541] kobject: 'ip6gre0' (000000004849e330): auto cleanup 'remove' event [ 1070.865190] kobject: 'gre0' (00000000c9b706d6): kobject_uevent_env [ 1070.877327] kobject: 'ip6gre0' (000000004849e330): kobject_uevent_env [ 1070.877336] kobject: 'ip6gre0' (000000004849e330): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1070.877405] kobject: 'ip6gre0' (000000004849e330): calling ktype release [ 1070.877422] kobject: 'ip6gre0': free name [ 1070.888084] IPVS: ftp: loaded support on port[0] = 21 [ 1070.894900] kobject: 'gre0' (00000000c9b706d6): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1070.922586] kobject: 'queues' (000000008449bb5f): kobject_add_internal: parent: 'gre0', set: '' [ 1070.929527] kobject: 'holders' (00000000acdc2933): kobject_cleanup, parent 000000002f458039 [ 1070.948943] kobject: 'holders' (00000000acdc2933): auto cleanup kobject_del [ 1070.949665] kobject: 'queues' (000000008449bb5f): kobject_uevent_env [ 1070.964824] kobject: 'holders' (00000000acdc2933): calling ktype release [ 1070.968099] kobject: 'queues' (000000008449bb5f): kobject_uevent_env: filter function caused the event to drop! [ 1070.972041] kobject: 'loop3' (0000000063865547): kobject_uevent_env [ 1070.985512] kobject: 'rx-0' (0000000009fb298a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1071.000617] kobject: (00000000acdc2933): dynamic_kobj_release [ 1071.007198] kobject: 'loop3' (0000000063865547): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1071.016508] kobject: 'rx-0' (0000000009fb298a): kobject_uevent_env [ 1071.018012] kobject: 'holders': free name [ 1071.030958] kobject: 'rx-0' (0000000009fb298a): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1071.031475] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1071.054665] kobject: 'loop5p1' (000000002f458039): kobject_uevent_env [ 1071.055322] kobject: 'tx-0' (00000000fb60f33c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1071.065244] kobject: 'loop5p1' (000000002f458039): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1' [ 1071.071042] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1071.088169] loop5: p1 < > p4 [ 1071.093857] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1071.102837] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1071.110412] kobject: 'tx-0' (00000000fb60f33c): kobject_uevent_env [ 1071.126856] kobject: 'loop5p1' (00000000d3e50e12): kobject_add_internal: parent: 'loop5', set: 'devices' [ 1071.129473] kobject: 'tx-0' (00000000fb60f33c): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1071.147013] kobject: 'loop5p1' (00000000d3e50e12): kobject_uevent_env [ 1071.148103] kobject: 'gretap0' (00000000ba4ee055): kobject_add_internal: parent: 'net', set: 'devices' [ 1071.164157] kobject: 'gretap0' (00000000ba4ee055): kobject_uevent_env [ 1071.165568] kobject: 'loop5p1' (000000002f458039): kobject_cleanup, parent (null) [ 1071.171080] kobject: 'gretap0' (00000000ba4ee055): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 1071.184651] kobject: 'loop5p1' (00000000d3e50e12): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.189601] kobject: 'queues' (00000000d638adf8): kobject_add_internal: parent: 'gretap0', set: '' [ 1071.209047] kobject: 'loop5p1' (000000002f458039): calling ktype release [ 1071.218063] kobject: 'loop5p1': free name [ 1071.221704] kobject: 'queues' (00000000d638adf8): kobject_uevent_env [ 1071.222482] kobject: 'holders' (00000000696a07b3): kobject_add_internal: parent: 'loop5p1', set: '' [ 1071.238844] kobject: 'queues' (00000000d638adf8): kobject_uevent_env: filter function caused the event to drop! [ 1071.240917] kobject: 'loop5p1' (00000000d3e50e12): kobject_uevent_env [ 1071.258199] kobject: 'loop5p1' (00000000d3e50e12): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1' [ 1071.262460] kobject: 'rx-0' (00000000fac56e96): kobject_add_internal: parent: 'queues', set: 'queues' [ 1071.269656] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1071.282184] kobject: 'rx-0' (00000000fac56e96): kobject_uevent_env [ 1071.290923] kobject: 'rx-0' (00000000fac56e96): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 1071.307027] kobject: 'tx-0' (000000001c3a34dd): kobject_add_internal: parent: 'queues', set: 'queues' [ 1071.316707] kobject: 'tx-0' (000000001c3a34dd): kobject_uevent_env [ 1071.323110] kobject: 'tx-0' (000000001c3a34dd): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 1071.334259] kobject: 'batman_adv' (000000000bb456dd): kobject_add_internal: parent: 'gretap0', set: '' [ 1071.345937] kobject: 'rx-0' (00000000d711ad18): kobject_cleanup, parent 00000000f66fc7fe [ 1071.348163] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1071.354650] kobject: 'rx-0' (00000000d711ad18): auto cleanup 'remove' event [ 1071.362930] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1071.368146] kobject: 'rx-0' (00000000d711ad18): kobject_uevent_env [ 1071.381611] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1071.388461] kobject: 'rx-0' (00000000d711ad18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.397062] print_req_error: 8 callbacks suppressed [ 1071.397072] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 1071.400941] kobject: 'rx-0' (00000000d711ad18): auto cleanup kobject_del [ 1071.413681] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1071.419950] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1071.427722] buffer_io_error: 6 callbacks suppressed [ 1071.427730] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1071.433007] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1071.440206] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1071.445415] kobject: 'rx-0' (00000000d711ad18): calling ktype release [ 1071.454610] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1071.461639] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1071.470523] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1071.475119] kobject: 'rx-0': free name [ 1071.481299] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1071.481528] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 1071.493258] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1071.499739] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 1071.508004] kobject: 'tx-0' (00000000fcdb9728): kobject_cleanup, parent 00000000f66fc7fe [ 1071.518262] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1071.536328] kobject: 'tx-0' (00000000fcdb9728): auto cleanup 'remove' event [ 1071.537716] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1071.554480] kobject: 'tx-0' (00000000fcdb9728): kobject_uevent_env [ 1071.554971] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1071.571232] kobject: 'tx-0' (00000000fcdb9728): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.572608] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1071.586018] kobject: 'tx-0' (00000000fcdb9728): auto cleanup kobject_del [ 1071.598034] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1071.598079] kobject: 'tx-0' (00000000fcdb9728): calling ktype release [ 1071.606621] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1071.611138] kobject: 'tx-0': free name [ 1071.627727] kobject: 'queues' (00000000f66fc7fe): kobject_cleanup, parent (null) [ 1071.638347] kobject: 'queues' (00000000f66fc7fe): calling ktype release [ 1071.645224] kobject: 'queues' (00000000f66fc7fe): kset_release [ 1071.651356] kobject: 'queues': free name [ 1071.656028] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env [ 1071.662679] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.675659] kobject: 'rx-0' (00000000b3f7c06e): kobject_cleanup, parent 000000007b9abffe [ 1071.684113] kobject: 'rx-0' (00000000b3f7c06e): auto cleanup 'remove' event [ 1071.691334] kobject: 'rx-0' (00000000b3f7c06e): kobject_uevent_env [ 1071.698553] kobject: 'rx-0' (00000000b3f7c06e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.708890] kobject: 'rx-0' (00000000b3f7c06e): auto cleanup kobject_del [ 1071.715802] kobject: 'rx-0' (00000000b3f7c06e): calling ktype release [ 1071.722388] kobject: 'rx-0': free name [ 1071.726347] kobject: 'tx-0' (000000009b550f63): kobject_cleanup, parent 000000007b9abffe [ 1071.734637] kobject: 'tx-0' (000000009b550f63): auto cleanup 'remove' event [ 1071.741750] kobject: 'tx-0' (000000009b550f63): kobject_uevent_env [ 1071.748110] kobject: 'tx-0' (000000009b550f63): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.758208] kobject: 'tx-0' (000000009b550f63): auto cleanup kobject_del [ 1071.765096] kobject: 'tx-0' (000000009b550f63): calling ktype release [ 1071.771674] kobject: 'tx-0': free name [ 1071.775622] kobject: 'queues' (000000007b9abffe): kobject_cleanup, parent (null) [ 1071.784050] kobject: 'queues' (000000007b9abffe): calling ktype release [ 1071.790803] kobject: 'queues' (000000007b9abffe): kset_release [ 1071.796799] kobject: 'queues': free name [ 1071.801107] kobject: 'ip6tnl0' (000000006e9812f2): kobject_uevent_env [ 1071.807716] kobject: 'ip6tnl0' (000000006e9812f2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.818594] kobject: 'rx-0' (0000000072f68b33): kobject_cleanup, parent 0000000066625824 [ 1071.827122] kobject: 'rx-0' (0000000072f68b33): auto cleanup 'remove' event [ 1071.834281] kobject: 'rx-0' (0000000072f68b33): kobject_uevent_env [ 1071.840614] kobject: 'rx-0' (0000000072f68b33): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.850697] kobject: 'rx-0' (0000000072f68b33): auto cleanup kobject_del [ 1071.857584] kobject: 'rx-0' (0000000072f68b33): calling ktype release [ 1071.864179] kobject: 'rx-0': free name [ 1071.868104] kobject: 'tx-0' (000000006311c058): kobject_cleanup, parent 0000000066625824 [ 1071.876367] kobject: 'tx-0' (000000006311c058): auto cleanup 'remove' event [ 1071.884022] kobject: 'tx-0' (000000006311c058): kobject_uevent_env [ 1071.890335] kobject: 'tx-0' (000000006311c058): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.900536] kobject: 'tx-0' (000000006311c058): auto cleanup kobject_del [ 1071.907446] kobject: 'tx-0' (000000006311c058): calling ktype release [ 1071.914161] kobject: 'tx-0': free name [ 1071.918071] kobject: 'queues' (0000000066625824): kobject_cleanup, parent (null) [ 1071.926492] kobject: 'queues' (0000000066625824): calling ktype release [ 1071.933244] kobject: 'queues' (0000000066625824): kset_release [ 1071.939247] kobject: 'queues': free name [ 1071.943505] kobject: 'ip6tnl0' (000000004152076e): kobject_uevent_env [ 1071.950121] kobject: 'ip6tnl0' (000000004152076e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.961148] kobject: 'rx-0' (0000000088debf99): kobject_cleanup, parent 000000004cc1474d [ 1071.969420] kobject: 'rx-0' (0000000088debf99): auto cleanup 'remove' event [ 1071.976641] kobject: 'rx-0' (0000000088debf99): kobject_uevent_env [ 1071.982963] kobject: 'rx-0' (0000000088debf99): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1071.993064] kobject: 'rx-0' (0000000088debf99): auto cleanup kobject_del [ 1072.000035] kobject: 'rx-0' (0000000088debf99): calling ktype release [ 1072.006654] kobject: 'rx-0': free name [ 1072.010572] kobject: 'tx-0' (000000009400145d): kobject_cleanup, parent 000000004cc1474d [ 1072.018828] kobject: 'tx-0' (000000009400145d): auto cleanup 'remove' event [ 1072.025953] kobject: 'tx-0' (000000009400145d): kobject_uevent_env [ 1072.032270] kobject: 'tx-0' (000000009400145d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1072.042375] kobject: 'tx-0' (000000009400145d): auto cleanup kobject_del [ 1072.049255] kobject: 'tx-0' (000000009400145d): calling ktype release [ 1072.055876] kobject: 'tx-0': free name [ 1072.059777] kobject: 'queues' (000000004cc1474d): kobject_cleanup, parent (null) [ 1072.068211] kobject: 'queues' (000000004cc1474d): calling ktype release [ 1072.075017] kobject: 'queues' (000000004cc1474d): kset_release [ 1072.080994] kobject: 'queues': free name [ 1072.085547] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_uevent_env [ 1072.092136] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1072.144375] kobject: 'erspan0' (00000000394dcacf): kobject_add_internal: parent: 'net', set: 'devices' [ 1072.156610] kobject: 'erspan0' (00000000394dcacf): kobject_uevent_env [ 1072.163252] kobject: 'erspan0' (00000000394dcacf): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 1072.173003] kobject: 'queues' (000000000253315a): kobject_add_internal: parent: 'erspan0', set: '' [ 1072.184917] kobject: 'queues' (000000000253315a): kobject_uevent_env [ 1072.191430] kobject: 'queues' (000000000253315a): kobject_uevent_env: filter function caused the event to drop! [ 1072.202753] kobject: 'rx-0' (0000000092ac42cd): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.213276] kobject: 'rx-0' (0000000092ac42cd): kobject_uevent_env [ 1072.221060] kobject: 'rx-0' (0000000092ac42cd): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 1072.232650] kobject: 'tx-0' (0000000090e15ff7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.243241] kobject: 'tx-0' (0000000090e15ff7): kobject_uevent_env [ 1072.250776] kobject: 'tx-0' (0000000090e15ff7): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 1072.263046] kobject: 'batman_adv' (00000000d1dbbe04): kobject_add_internal: parent: 'erspan0', set: '' [ 1072.274388] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_cleanup, parent (null) [ 1072.282925] kobject: 'ip6tnl0' (00000000dfcd519a): auto cleanup 'remove' event [ 1072.292355] kobject: 'ip_vti0' (0000000056388cf5): kobject_add_internal: parent: 'net', set: 'devices' [ 1072.302280] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env [ 1072.310640] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1072.322096] kobject: 'ip_vti0' (0000000056388cf5): kobject_uevent_env [ 1072.330526] kobject: 'ip6tnl0' (00000000dfcd519a): calling ktype release [ 1072.337863] kobject: 'ip_vti0' (0000000056388cf5): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 1072.349643] kobject: 'ip6tnl0': free name [ 1072.354388] kobject: 'queues' (00000000f90a63f6): kobject_add_internal: parent: 'ip_vti0', set: '' [ 1072.365978] kobject: 'queues' (00000000f90a63f6): kobject_uevent_env [ 1072.372549] kobject: 'queues' (00000000f90a63f6): kobject_uevent_env: filter function caused the event to drop! [ 1072.383229] kobject: 'rx-0' (000000006311dd6e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.394955] kobject: 'rx-0' (000000006311dd6e): kobject_uevent_env [ 1072.401384] kobject: 'rx-0' (000000006311dd6e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1072.412993] kobject: 'tx-0' (0000000080d4d6f9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.423193] kobject: 'tx-0' (0000000080d4d6f9): kobject_uevent_env [ 1072.430292] kobject: 'tx-0' (0000000080d4d6f9): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 1072.441829] kobject: 'ip6tnl0' (000000006e9812f2): kobject_cleanup, parent (null) [ 1072.441991] kobject: 'ip6_vti0' (00000000e7e67cf2): kobject_add_internal: parent: 'net', set: 'devices' [ 1072.455351] kobject: 'ip6tnl0' (000000006e9812f2): auto cleanup 'remove' event [ 1072.464807] kobject: 'ip6_vti0' (00000000e7e67cf2): kobject_uevent_env [ 1072.474467] kobject: 'ip6_vti0' (00000000e7e67cf2): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 1072.475204] kobject: 'ip6tnl0' (000000006e9812f2): kobject_uevent_env [ 1072.484621] kobject: 'queues' (0000000065a217c6): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 1072.500832] kobject: 'ip6tnl0' (000000006e9812f2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1072.500873] kobject: 'queues' (0000000065a217c6): kobject_uevent_env [ 1072.512231] kobject: 'ip6tnl0' (000000006e9812f2): calling ktype release [ 1072.517913] kobject: 'queues' (0000000065a217c6): kobject_uevent_env: filter function caused the event to drop! [ 1072.526683] kobject: 'ip6tnl0': free name [ 1072.535357] kobject: 'rx-0' (00000000a72e5ec4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.548827] kobject: 'rx-0' (00000000a72e5ec4): kobject_uevent_env [ 1072.555255] kobject: 'rx-0' (00000000a72e5ec4): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 1072.565965] kobject: 'tx-0' (00000000d2c9a95b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.575528] kobject: 'tx-0' (00000000d2c9a95b): kobject_uevent_env [ 1072.581984] kobject: 'tx-0' (00000000d2c9a95b): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 1072.593314] kobject: 'sit0' (000000004d4b99c7): kobject_add_internal: parent: 'net', set: 'devices' [ 1072.603037] kobject: 'sit0' (000000004d4b99c7): kobject_uevent_env [ 1072.609492] kobject: 'sit0' (000000004d4b99c7): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 1072.618891] kobject: 'queues' (00000000d93e6638): kobject_add_internal: parent: 'sit0', set: '' [ 1072.628411] kobject: 'queues' (00000000d93e6638): kobject_uevent_env [ 1072.635090] kobject: 'queues' (00000000d93e6638): kobject_uevent_env: filter function caused the event to drop! [ 1072.645454] kobject: 'rx-0' (00000000cbfc1dc9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.655061] kobject: 'rx-0' (00000000cbfc1dc9): kobject_uevent_env [ 1072.661474] kobject: 'rx-0' (00000000cbfc1dc9): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 1072.671784] kobject: 'tx-0' (00000000348c2ed0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.681394] kobject: 'tx-0' (00000000348c2ed0): kobject_uevent_env [ 1072.687883] kobject: 'tx-0' (00000000348c2ed0): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 1072.698946] kobject: 'ip6tnl0' (000000006fef3720): kobject_add_internal: parent: 'net', set: 'devices' [ 1072.705865] kobject: 'ip6tnl0' (000000004152076e): kobject_cleanup, parent (null) [ 1072.708999] kobject: 'ip6tnl0' (000000006fef3720): kobject_uevent_env [ 1072.723588] kobject: 'ip6tnl0' (000000006fef3720): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 1072.723638] kobject: 'ip6tnl0' (000000004152076e): auto cleanup 'remove' event [ 1072.733398] kobject: 'queues' (00000000dbb8ea1b): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 1072.747595] kobject: 'ip6tnl0' (000000004152076e): kobject_uevent_env [ 1072.750594] kobject: 'queues' (00000000dbb8ea1b): kobject_uevent_env [ 1072.758948] kobject: 'ip6tnl0' (000000004152076e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1072.763596] kobject: 'queues' (00000000dbb8ea1b): kobject_uevent_env: filter function caused the event to drop! [ 1072.773887] kobject: 'ip6tnl0' (000000004152076e): calling ktype release [ 1072.773917] kobject: 'ip6tnl0': free name [ 1072.784332] kobject: 'rx-0' (000000009c433adf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.804792] kobject: 'rx-0' (000000009c433adf): kobject_uevent_env [ 1072.811231] kobject: 'rx-0' (000000009c433adf): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 1072.821800] kobject: 'tx-0' (000000008eeb3210): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.831339] kobject: 'tx-0' (000000008eeb3210): kobject_uevent_env [ 1072.837815] kobject: 'tx-0' (000000008eeb3210): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 1072.849065] kobject: 'ip6gre0' (0000000091e3dae9): kobject_add_internal: parent: 'net', set: 'devices' [ 1072.859133] kobject: 'ip6gre0' (0000000091e3dae9): kobject_uevent_env [ 1072.865840] kobject: 'ip6gre0' (0000000091e3dae9): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 1072.875595] kobject: 'queues' (0000000025b5adc9): kobject_add_internal: parent: 'ip6gre0', set: '' [ 1072.885475] kobject: 'queues' (0000000025b5adc9): kobject_uevent_env [ 1072.892038] kobject: 'queues' (0000000025b5adc9): kobject_uevent_env: filter function caused the event to drop! [ 1072.902373] kobject: 'rx-0' (0000000023ebddda): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.911901] kobject: 'rx-0' (0000000023ebddda): kobject_uevent_env [ 1072.918326] kobject: 'rx-0' (0000000023ebddda): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 1072.928907] kobject: 'tx-0' (000000008bcc7a12): kobject_add_internal: parent: 'queues', set: 'queues' [ 1072.938538] kobject: 'tx-0' (000000008bcc7a12): kobject_uevent_env [ 1072.945117] kobject: 'tx-0' (000000008bcc7a12): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 1072.956549] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_cleanup, parent (null) [ 1072.965180] kobject: 'ip6tnl0' (00000000a6b839a4): auto cleanup 'remove' event [ 1072.972546] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_uevent_env [ 1072.979187] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1072.989575] kobject: 'ip6tnl0' (00000000a6b839a4): calling ktype release [ 1072.996738] kobject: 'ip6tnl0': free name [ 1073.001666] kobject: 'rx-0' (000000005a6c8c98): kobject_cleanup, parent 0000000025e932a3 [ 1073.009968] kobject: 'rx-0' (000000005a6c8c98): auto cleanup 'remove' event [ 1073.017110] kobject: 'rx-0' (000000005a6c8c98): kobject_uevent_env [ 1073.023441] kobject: 'rx-0' (000000005a6c8c98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.033518] kobject: 'rx-0' (000000005a6c8c98): auto cleanup kobject_del [ 1073.040398] kobject: 'rx-0' (000000005a6c8c98): calling ktype release [ 1073.047522] kobject: 'rx-0': free name [ 1073.051452] kobject: 'tx-0' (000000008d152d30): kobject_cleanup, parent 0000000025e932a3 [ 1073.059764] kobject: 'tx-0' (000000008d152d30): auto cleanup 'remove' event [ 1073.066892] kobject: 'tx-0' (000000008d152d30): kobject_uevent_env [ 1073.073199] kobject: 'tx-0' (000000008d152d30): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.083273] kobject: 'tx-0' (000000008d152d30): auto cleanup kobject_del [ 1073.090156] kobject: 'tx-0' (000000008d152d30): calling ktype release [ 1073.096784] kobject: 'tx-0': free name [ 1073.100692] kobject: 'queues' (0000000025e932a3): kobject_cleanup, parent (null) [ 1073.109127] kobject: 'queues' (0000000025e932a3): calling ktype release [ 1073.115927] kobject: 'queues' (0000000025e932a3): kset_release [ 1073.121904] kobject: 'queues': free name [ 1073.126494] kobject: 'sit0' (00000000595c109e): kobject_uevent_env [ 1073.132811] kobject: 'sit0' (00000000595c109e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.143483] kobject: 'rx-0' (000000005c822ddf): kobject_cleanup, parent 00000000cfad06cc [ 1073.152074] kobject: 'rx-0' (000000005c822ddf): auto cleanup 'remove' event [ 1073.159236] kobject: 'rx-0' (000000005c822ddf): kobject_uevent_env [ 1073.165591] kobject: 'rx-0' (000000005c822ddf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.175692] kobject: 'rx-0' (000000005c822ddf): auto cleanup kobject_del [ 1073.182561] kobject: 'rx-0' (000000005c822ddf): calling ktype release [ 1073.189193] kobject: 'rx-0': free name [ 1073.193120] kobject: 'tx-0' (00000000f9be7739): kobject_cleanup, parent 00000000cfad06cc [ 1073.201378] kobject: 'tx-0' (00000000f9be7739): auto cleanup 'remove' event [ 1073.208503] kobject: 'tx-0' (00000000f9be7739): kobject_uevent_env [ 1073.214851] kobject: 'tx-0' (00000000f9be7739): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.224931] kobject: 'tx-0' (00000000f9be7739): auto cleanup kobject_del [ 1073.231778] kobject: 'tx-0' (00000000f9be7739): calling ktype release [ 1073.238379] kobject: 'tx-0': free name [ 1073.242278] kobject: 'queues' (00000000cfad06cc): kobject_cleanup, parent (null) [ 1073.250711] kobject: 'queues' (00000000cfad06cc): calling ktype release [ 1073.257664] kobject: 'queues' (00000000cfad06cc): kset_release [ 1073.263626] kobject: 'queues': free name [ 1073.267997] kobject: 'sit0' (00000000b982a3d6): kobject_uevent_env [ 1073.274356] kobject: 'sit0' (00000000b982a3d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.285180] kobject: 'rx-0' (000000003dd16b5d): kobject_cleanup, parent 000000004731be66 [ 1073.293422] kobject: 'rx-0' (000000003dd16b5d): auto cleanup 'remove' event [ 1073.300552] kobject: 'rx-0' (000000003dd16b5d): kobject_uevent_env [ 1073.306910] kobject: 'rx-0' (000000003dd16b5d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.316984] kobject: 'rx-0' (000000003dd16b5d): auto cleanup kobject_del [ 1073.323839] kobject: 'rx-0' (000000003dd16b5d): calling ktype release [ 1073.330453] kobject: 'rx-0': free name [ 1073.334405] kobject: 'tx-0' (0000000019ff1767): kobject_cleanup, parent 000000004731be66 [ 1073.342637] kobject: 'tx-0' (0000000019ff1767): auto cleanup 'remove' event [ 1073.349764] kobject: 'tx-0' (0000000019ff1767): kobject_uevent_env [ 1073.356108] kobject: 'tx-0' (0000000019ff1767): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.366182] kobject: 'tx-0' (0000000019ff1767): auto cleanup kobject_del [ 1073.373040] kobject: 'tx-0' (0000000019ff1767): calling ktype release [ 1073.379651] kobject: 'tx-0': free name [ 1073.383548] kobject: 'queues' (000000004731be66): kobject_cleanup, parent (null) [ 1073.392240] kobject: 'queues' (000000004731be66): calling ktype release [ 1073.399038] kobject: 'queues' (000000004731be66): kset_release [ 1073.405185] kobject: 'queues': free name [ 1073.409443] kobject: '' (00000000d38147d6): kobject_uevent_env [ 1073.415659] kobject: '' (00000000d38147d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.426182] kobject: 'rx-0' (00000000b17cbb51): kobject_cleanup, parent 000000008e86f7cd [ 1073.434443] kobject: 'rx-0' (00000000b17cbb51): auto cleanup 'remove' event [ 1073.441541] kobject: 'rx-0' (00000000b17cbb51): kobject_uevent_env [ 1073.447895] kobject: 'rx-0' (00000000b17cbb51): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.457969] kobject: 'rx-0' (00000000b17cbb51): auto cleanup kobject_del [ 1073.464859] kobject: 'rx-0' (00000000b17cbb51): calling ktype release [ 1073.471438] kobject: 'rx-0': free name [ 1073.475391] kobject: 'tx-0' (00000000a017010d): kobject_cleanup, parent 000000008e86f7cd [ 1073.483623] kobject: 'tx-0' (00000000a017010d): auto cleanup 'remove' event [ 1073.490754] kobject: 'tx-0' (00000000a017010d): kobject_uevent_env [ 1073.497790] kobject: 'tx-0' (00000000a017010d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.507901] kobject: 'tx-0' (00000000a017010d): auto cleanup kobject_del [ 1073.515111] kobject: 'tx-0' (00000000a017010d): calling ktype release [ 1073.521697] kobject: 'tx-0': free name [ 1073.525641] kobject: 'queues' (000000008e86f7cd): kobject_cleanup, parent (null) [ 1073.534213] kobject: 'queues' (000000008e86f7cd): calling ktype release [ 1073.540966] kobject: 'queues' (000000008e86f7cd): kset_release [ 1073.546968] kobject: 'queues': free name [ 1073.551295] kobject: 'sit0' (0000000046818174): kobject_uevent_env [ 1073.557650] kobject: 'sit0' (0000000046818174): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.568260] kobject: 'rx-0' (0000000062556e0d): kobject_cleanup, parent 00000000bef092ed [ 1073.576741] kobject: 'rx-0' (0000000062556e0d): auto cleanup 'remove' event [ 1073.583849] kobject: 'rx-0' (0000000062556e0d): kobject_uevent_env [ 1073.590212] kobject: 'rx-0' (0000000062556e0d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.600295] kobject: 'rx-0' (0000000062556e0d): auto cleanup kobject_del [ 1073.607192] kobject: 'rx-0' (0000000062556e0d): calling ktype release [ 1073.613768] kobject: 'rx-0': free name [ 1073.617719] kobject: 'tx-0' (0000000003a9e886): kobject_cleanup, parent 00000000bef092ed [ 1073.625972] kobject: 'tx-0' (0000000003a9e886): auto cleanup 'remove' event [ 1073.633062] kobject: 'tx-0' (0000000003a9e886): kobject_uevent_env [ 1073.639405] kobject: 'tx-0' (0000000003a9e886): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.649658] kobject: 'tx-0' (0000000003a9e886): auto cleanup kobject_del [ 1073.656634] kobject: 'tx-0' (0000000003a9e886): calling ktype release [ 1073.663391] kobject: 'tx-0': free name [ 1073.667444] kobject: 'queues' (00000000bef092ed): kobject_cleanup, parent (null) [ 1073.675901] kobject: 'queues' (00000000bef092ed): calling ktype release [ 1073.682671] kobject: 'queues' (00000000bef092ed): kset_release [ 1073.688692] kobject: 'queues': free name [ 1073.692997] kobject: 'sit0' (000000000798246a): kobject_uevent_env [ 1073.699354] kobject: 'sit0' (000000000798246a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.709982] kobject: 'rx-0' (000000009c04c052): kobject_cleanup, parent 00000000932205e6 [ 1073.718246] kobject: 'rx-0' (000000009c04c052): auto cleanup 'remove' event [ 1073.725381] kobject: 'rx-0' (000000009c04c052): kobject_uevent_env [ 1073.731697] kobject: 'rx-0' (000000009c04c052): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.741827] kobject: 'rx-0' (000000009c04c052): auto cleanup kobject_del [ 1073.748723] kobject: 'rx-0' (000000009c04c052): calling ktype release [ 1073.755354] kobject: 'rx-0': free name [ 1073.759273] kobject: 'tx-0' (00000000ac338e06): kobject_cleanup, parent 00000000932205e6 [ 1073.767544] kobject: 'tx-0' (00000000ac338e06): auto cleanup 'remove' event [ 1073.774855] kobject: 'tx-0' (00000000ac338e06): kobject_uevent_env [ 1073.781166] kobject: 'tx-0' (00000000ac338e06): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.791260] kobject: 'tx-0' (00000000ac338e06): auto cleanup kobject_del [ 1073.798251] kobject: 'tx-0' (00000000ac338e06): calling ktype release [ 1073.804872] kobject: 'tx-0': free name [ 1073.808774] kobject: 'queues' (00000000932205e6): kobject_cleanup, parent (null) [ 1073.817205] kobject: 'queues' (00000000932205e6): calling ktype release [ 1073.824012] kobject: 'queues' (00000000932205e6): kset_release [ 1073.830004] kobject: 'queues': free name [ 1073.834371] kobject: '' (0000000069798d68): kobject_uevent_env [ 1073.840440] kobject: '' (0000000069798d68): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.884137] kobject: 'sit0' (00000000595c109e): kobject_cleanup, parent (null) [ 1073.892410] kobject: 'sit0' (00000000595c109e): auto cleanup 'remove' event [ 1073.899785] kobject: 'sit0' (00000000595c109e): kobject_uevent_env [ 1073.906425] kobject: 'sit0' (00000000595c109e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.916519] kobject: 'sit0' (00000000595c109e): calling ktype release [ 1073.923124] kobject: 'sit0': free name 03:47:17 executing program 4: unshare(0x60000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00@\x00', @ifru_flags}) 03:47:17 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) 03:47:17 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:47:17 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:47:17 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffdfc, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1073.927094] kobject: 'sit0' (00000000b982a3d6): kobject_cleanup, parent (null) [ 1073.935355] kobject: 'sit0' (00000000b982a3d6): auto cleanup 'remove' event [ 1073.942468] kobject: 'sit0' (00000000b982a3d6): kobject_uevent_env [ 1073.948846] kobject: 'sit0' (00000000b982a3d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1073.958942] kobject: 'sit0' (00000000b982a3d6): calling ktype release [ 1073.965585] kobject: 'sit0': free name [ 1073.969513] kobject: '' (00000000d38147d6): kobject_cleanup, parent (null) [ 1073.998888] kobject: '' (00000000d38147d6): auto cleanup 'remove' event [ 1074.000016] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1074.010658] kobject: '' (00000000d38147d6): kobject_uevent_env [ 1074.013198] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1074.022405] kobject: '' (00000000d38147d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1074.041551] kobject: '' (00000000d38147d6): calling ktype release 03:47:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1074.049156] kobject: '': free name [ 1074.053122] kobject: 'sit0' (0000000046818174): kobject_cleanup, parent (null) [ 1074.067038] kobject: 'sit0' (0000000046818174): auto cleanup 'remove' event [ 1074.076821] kobject: 'sit0' (0000000046818174): kobject_uevent_env [ 1074.083461] kobject: 'sit0' (0000000046818174): kobject_uevent_env: uevent_suppress caused the event to drop! 03:47:17 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x10000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) [ 1074.114155] kobject: 'loop4' (00000000c75b5a47): kobject_uevent_env [ 1074.126332] kobject: 'sit0' (0000000046818174): calling ktype release [ 1074.139110] kobject: 'loop4' (00000000c75b5a47): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1074.147550] kobject: 'sit0': free name [ 1074.154507] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1074.157803] IPVS: ftp: loaded support on port[0] = 21 [ 1074.161263] kobject: 'sit0' (000000000798246a): kobject_cleanup, parent (null) [ 1074.168312] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1074.175782] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1074.189305] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1074.191029] kobject: 'sit0' (000000000798246a): auto cleanup 'remove' event [ 1074.210569] kobject: 'lo' (0000000074cfef36): kobject_add_internal: parent: 'net', set: 'devices' [ 1074.220009] kobject: 'sit0' (000000000798246a): kobject_uevent_env [ 1074.224002] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.226582] kobject: 'sit0' (000000000798246a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1074.231417] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.242021] kobject: 'lo' (0000000074cfef36): kobject_uevent_env [ 1074.246551] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.252693] kobject: 'sit0' (000000000798246a): calling ktype release 03:47:17 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9) r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6') r5 = semget$private(0x0, 0x1, 0x400) semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096) ioctl$UI_DEV_DESTROY(r0, 0x5502) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000) renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 1074.257706] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.267204] kobject: 'lo' (0000000074cfef36): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1074.278591] kobject: 'loop1' (00000000243dd996): kobject_uevent_env [ 1074.298939] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1074.309142] kobject: 'sit0': free name 03:47:17 executing program 0: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r0, 0x0, 0xfd54) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2) 03:47:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1074.313411] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1074.323092] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1074.341051] kobject: 'queues' (0000000035691c7a): kobject_add_internal: parent: 'lo', set: '' [ 1074.376629] kobject: 'loop1' (00000000243dd996): kobject_uevent_env [ 1074.383102] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1074.417779] kobject: 'queues' (0000000035691c7a): kobject_uevent_env [ 1074.436127] kobject: 'queues' (0000000035691c7a): kobject_uevent_env: filter function caused the event to drop! [ 1074.441519] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env [ 1074.454503] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env 03:47:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9) [ 1074.465770] kobject: 'rx-0' (00000000357a20fb): kobject_add_internal: parent: 'queues', set: 'queues' [ 1074.475652] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1074.485472] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1074.487936] kobject: 'rx-0' (00000000357a20fb): kobject_uevent_env [ 1074.510623] kobject: 'rx-0' (00000000357a20fb): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1074.529588] kobject: 'tx-0' (00000000c4f8f030): kobject_add_internal: parent: 'queues', set: 'queues' [ 1074.533670] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1074.567740] kobject: 'tx-0' (00000000c4f8f030): kobject_uevent_env [ 1074.575392] kobject: 'tx-0' (00000000c4f8f030): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1074.590314] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1074.597269] kobject: '' (0000000069798d68): kobject_cleanup, parent (null) [ 1074.608195] kobject: 'tunl0' (000000009fd2f6fa): kobject_add_internal: parent: 'net', set: 'devices' [ 1074.612518] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env [ 1074.620201] kobject: '' (0000000069798d68): auto cleanup 'remove' event [ 1074.630876] kobject: '' (0000000069798d68): kobject_uevent_env [ 1074.641567] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1074.644029] kobject: '' (0000000069798d68): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1074.652204] kobject: 'loop1' (00000000243dd996): kobject_uevent_env [ 1074.664109] kobject: 'tunl0' (000000009fd2f6fa): kobject_uevent_env [ 1074.670201] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1074.675884] kobject: 'tunl0' (000000009fd2f6fa): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1074.684322] kobject: '' (0000000069798d68): calling ktype release [ 1074.692879] kobject: 'queues' (000000006416942c): kobject_add_internal: parent: 'tunl0', set: '' [ 1074.711997] kobject: '': free name [ 1074.718540] kobject: 'queues' (000000006416942c): kobject_uevent_env [ 1074.725976] kobject: 'queues' (000000006416942c): kobject_uevent_env: filter function caused the event to drop! [ 1074.736407] kobject: 'rx-0' (00000000110f5163): kobject_add_internal: parent: 'queues', set: 'queues' [ 1074.746049] kobject: 'rx-0' (00000000110f5163): kobject_uevent_env [ 1074.752499] kobject: 'rx-0' (00000000110f5163): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1074.762909] kobject: 'tx-0' (000000001bd77545): kobject_add_internal: parent: 'queues', set: 'queues' [ 1074.772800] kobject: 'tx-0' (000000001bd77545): kobject_uevent_env [ 1074.779195] kobject: 'tx-0' (000000001bd77545): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1074.789951] kobject: 'gre0' (000000008af2621d): kobject_add_internal: parent: 'net', set: 'devices' [ 1074.807163] kobject: 'gre0' (000000008af2621d): kobject_uevent_env [ 1074.813809] kobject: 'gre0' (000000008af2621d): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1074.823553] kobject: 'queues' (00000000dbbeccee): kobject_add_internal: parent: 'gre0', set: '' [ 1074.835673] kobject: 'queues' (00000000dbbeccee): kobject_uevent_env [ 1074.842652] kobject: 'queues' (00000000dbbeccee): kobject_uevent_env: filter function caused the event to drop! [ 1074.855627] kobject: 'rx-0' (0000000058b3d5a7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1074.866436] kobject: 'rx-0' (0000000058b3d5a7): kobject_uevent_env [ 1074.873082] kobject: 'rx-0' (0000000058b3d5a7): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1074.885904] kobject: 'tx-0' (000000008c073113): kobject_add_internal: parent: 'queues', set: 'queues' [ 1074.895901] kobject: 'tx-0' (000000008c073113): kobject_uevent_env [ 1074.902623] kobject: 'tx-0' (000000008c073113): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1074.915228] kobject: 'rx-0' (00000000838561bd): kobject_cleanup, parent 0000000028e9c764 [ 1074.920423] kobject: 'loop3' (0000000063865547): kobject_uevent_env [ 1074.923522] kobject: 'rx-0' (00000000838561bd): auto cleanup 'remove' event [ 1074.932022] kobject: 'loop3' (0000000063865547): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1074.939140] kobject: 'rx-0' (00000000838561bd): kobject_uevent_env [ 1074.949381] IPVS: ftp: loaded support on port[0] = 21 [ 1074.953148] kobject: 'rx-0' (00000000838561bd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1074.969092] kobject: 'rx-0' (00000000838561bd): auto cleanup kobject_del [ 1074.976179] kobject: 'rx-0' (00000000838561bd): calling ktype release [ 1074.982777] kobject: 'rx-0': free name [ 1074.987022] kobject: 'tx-0' (00000000dbdb033f): kobject_cleanup, parent 0000000028e9c764 [ 1074.995302] kobject: 'tx-0' (00000000dbdb033f): auto cleanup 'remove' event [ 1075.002417] kobject: 'tx-0' (00000000dbdb033f): kobject_uevent_env [ 1075.008978] kobject: 'tx-0' (00000000dbdb033f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.019149] kobject: 'tx-0' (00000000dbdb033f): auto cleanup kobject_del [ 1075.026125] kobject: 'tx-0' (00000000dbdb033f): calling ktype release [ 1075.032721] kobject: 'tx-0': free name [ 1075.036679] kobject: 'queues' (0000000028e9c764): kobject_cleanup, parent (null) [ 1075.045463] kobject: 'queues' (0000000028e9c764): calling ktype release [ 1075.052225] kobject: 'queues' (0000000028e9c764): kset_release [ 1075.058267] kobject: 'queues': free name [ 1075.062652] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env [ 1075.069427] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.080584] kobject: 'rx-0' (00000000f2501358): kobject_cleanup, parent 000000001070fc5c [ 1075.088902] kobject: 'rx-0' (00000000f2501358): auto cleanup 'remove' event [ 1075.096341] kobject: 'rx-0' (00000000f2501358): kobject_uevent_env [ 1075.102669] kobject: 'rx-0' (00000000f2501358): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.112806] kobject: 'rx-0' (00000000f2501358): auto cleanup kobject_del [ 1075.119887] kobject: 'rx-0' (00000000f2501358): calling ktype release [ 1075.126498] kobject: 'rx-0': free name [ 1075.130446] kobject: 'tx-0' (00000000fa47eedb): kobject_cleanup, parent 000000001070fc5c [ 1075.138754] kobject: 'tx-0' (00000000fa47eedb): auto cleanup 'remove' event [ 1075.145880] kobject: 'tx-0' (00000000fa47eedb): kobject_uevent_env [ 1075.152192] kobject: 'tx-0' (00000000fa47eedb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.162312] kobject: 'tx-0' (00000000fa47eedb): auto cleanup kobject_del [ 1075.169197] kobject: 'tx-0' (00000000fa47eedb): calling ktype release [ 1075.175948] kobject: 'tx-0': free name [ 1075.179855] kobject: 'queues' (000000001070fc5c): kobject_cleanup, parent (null) [ 1075.188299] kobject: 'queues' (000000001070fc5c): calling ktype release [ 1075.195093] kobject: 'queues' (000000001070fc5c): kset_release [ 1075.201062] kobject: 'queues': free name [ 1075.205415] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_uevent_env [ 1075.213579] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.224819] kobject: 'rx-0' (000000003251c162): kobject_cleanup, parent 00000000d2854296 [ 1075.233049] kobject: 'rx-0' (000000003251c162): auto cleanup 'remove' event [ 1075.240795] kobject: 'rx-0' (000000003251c162): kobject_uevent_env [ 1075.247144] kobject: 'rx-0' (000000003251c162): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.257230] kobject: 'rx-0' (000000003251c162): auto cleanup kobject_del [ 1075.264114] kobject: 'rx-0' (000000003251c162): calling ktype release [ 1075.270708] kobject: 'rx-0': free name [ 1075.274666] kobject: 'tx-0' (000000008ebf9869): kobject_cleanup, parent 00000000d2854296 [ 1075.282990] kobject: 'tx-0' (000000008ebf9869): auto cleanup 'remove' event [ 1075.290124] kobject: 'tx-0' (000000008ebf9869): kobject_uevent_env [ 1075.296490] kobject: 'tx-0' (000000008ebf9869): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.306564] kobject: 'tx-0' (000000008ebf9869): auto cleanup kobject_del [ 1075.313426] kobject: 'tx-0' (000000008ebf9869): calling ktype release [ 1075.320022] kobject: 'tx-0': free name [ 1075.323939] kobject: 'queues' (00000000d2854296): kobject_cleanup, parent (null) [ 1075.332389] kobject: 'queues' (00000000d2854296): calling ktype release [ 1075.339314] kobject: 'queues' (00000000d2854296): kset_release [ 1075.345323] kobject: 'queues': free name [ 1075.349586] kobject: 'ip6_vti0' (00000000b308458c): kobject_uevent_env [ 1075.356491] kobject: 'ip6_vti0' (00000000b308458c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.367527] kobject: 'rx-0' (00000000a4630e22): kobject_cleanup, parent 000000008b339d16 [ 1075.375810] kobject: 'rx-0' (00000000a4630e22): auto cleanup 'remove' event [ 1075.382908] kobject: 'rx-0' (00000000a4630e22): kobject_uevent_env [ 1075.389257] kobject: 'rx-0' (00000000a4630e22): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.399342] kobject: 'rx-0' (00000000a4630e22): auto cleanup kobject_del [ 1075.406228] kobject: 'rx-0' (00000000a4630e22): calling ktype release [ 1075.412803] kobject: 'rx-0': free name [ 1075.416759] kobject: 'tx-0' (0000000065c173c9): kobject_cleanup, parent 000000008b339d16 [ 1075.425021] kobject: 'tx-0' (0000000065c173c9): auto cleanup 'remove' event [ 1075.432122] kobject: 'tx-0' (0000000065c173c9): kobject_uevent_env [ 1075.438474] kobject: 'tx-0' (0000000065c173c9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.448551] kobject: 'tx-0' (0000000065c173c9): auto cleanup kobject_del [ 1075.455474] kobject: 'tx-0' (0000000065c173c9): calling ktype release [ 1075.462057] kobject: 'tx-0': free name [ 1075.466001] kobject: 'queues' (000000008b339d16): kobject_cleanup, parent (null) [ 1075.474453] kobject: 'queues' (000000008b339d16): calling ktype release [ 1075.481211] kobject: 'queues' (000000008b339d16): kset_release [ 1075.487471] kobject: 'queues': free name [ 1075.491758] kobject: 'ip6_vti0' (00000000fca7e1b6): kobject_uevent_env [ 1075.498975] kobject: 'ip6_vti0' (00000000fca7e1b6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.509847] kobject: 'gretap0' (0000000078ab82d5): kobject_add_internal: parent: 'net', set: 'devices' [ 1075.519881] kobject: 'gretap0' (0000000078ab82d5): kobject_uevent_env [ 1075.527375] kobject: 'gretap0' (0000000078ab82d5): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 1075.537240] kobject: 'queues' (0000000005101a6f): kobject_add_internal: parent: 'gretap0', set: '' [ 1075.546910] kobject: 'queues' (0000000005101a6f): kobject_uevent_env [ 1075.553406] kobject: 'queues' (0000000005101a6f): kobject_uevent_env: filter function caused the event to drop! [ 1075.563685] kobject: 'rx-0' (0000000091041b06): kobject_add_internal: parent: 'queues', set: 'queues' [ 1075.573104] kobject: 'rx-0' (0000000091041b06): kobject_uevent_env [ 1075.579481] kobject: 'rx-0' (0000000091041b06): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 1075.589984] kobject: 'tx-0' (00000000d715ff4a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1075.599482] kobject: 'tx-0' (00000000d715ff4a): kobject_uevent_env [ 1075.605870] kobject: 'tx-0' (00000000d715ff4a): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 1075.617072] kobject: 'batman_adv' (00000000af0ac621): kobject_add_internal: parent: 'gretap0', set: '' [ 1075.627559] kobject: 'erspan0' (00000000ec149928): kobject_add_internal: parent: 'net', set: 'devices' [ 1075.637489] kobject: 'erspan0' (00000000ec149928): kobject_uevent_env [ 1075.644145] kobject: 'erspan0' (00000000ec149928): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 1075.653834] kobject: 'queues' (00000000657dea1c): kobject_add_internal: parent: 'erspan0', set: '' [ 1075.663763] kobject: 'queues' (00000000657dea1c): kobject_uevent_env [ 1075.670317] kobject: 'queues' (00000000657dea1c): kobject_uevent_env: filter function caused the event to drop! [ 1075.680757] kobject: 'rx-0' (00000000749d5260): kobject_add_internal: parent: 'queues', set: 'queues' [ 1075.690191] kobject: 'rx-0' (00000000749d5260): kobject_uevent_env [ 1075.696556] kobject: 'rx-0' (00000000749d5260): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 1075.707080] kobject: 'tx-0' (00000000bf744a1e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1075.716543] kobject: 'tx-0' (00000000bf744a1e): kobject_uevent_env [ 1075.722872] kobject: 'tx-0' (00000000bf744a1e): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 1075.734127] kobject: 'batman_adv' (00000000b8db60f6): kobject_add_internal: parent: 'erspan0', set: '' [ 1075.748023] kobject: 'ip6_vti0' (0000000066777d82): kobject_cleanup, parent (null) [ 1075.748327] kobject: 'ip_vti0' (0000000065ec5c1a): kobject_add_internal: parent: 'net', set: 'devices' [ 1075.761071] kobject: 'ip6_vti0' (0000000066777d82): auto cleanup 'remove' event [ 1075.766635] kobject: 'ip_vti0' (0000000065ec5c1a): kobject_uevent_env [ 1075.773923] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env [ 1075.780276] kobject: 'ip_vti0' (0000000065ec5c1a): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 1075.780353] kobject: 'queues' (00000000e79d8662): kobject_add_internal: parent: 'ip_vti0', set: '' [ 1075.789476] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1075.796680] kobject: 'queues' (00000000e79d8662): kobject_uevent_env [ 1075.808512] kobject: 'ip6_vti0' (0000000066777d82): calling ktype release [ 1075.816755] kobject: 'queues' (00000000e79d8662): kobject_uevent_env: filter function caused the event to drop! [ 1075.816783] kobject: 'rx-0' (00000000dd9c5d4e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1075.816829] kobject: 'rx-0' (00000000dd9c5d4e): kobject_uevent_env [ 1075.824540] kobject: 'ip6_vti0': free name [ 1075.830281] kobject: 'rx-0' (00000000dd9c5d4e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1075.830360] kobject: 'tx-0' (00000000dd8525f1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1075.880629] kobject: 'tx-0' (00000000dd8525f1): kobject_uevent_env [ 1075.887022] kobject: 'tx-0' (00000000dd8525f1): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 1075.946183] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_cleanup, parent (null) [ 1075.955396] kobject: 'rx-0' (00000000dd9c5d4e): kobject_cleanup, parent 00000000e79d8662 [ 1075.963648] kobject: 'rx-0' (00000000dd9c5d4e): auto cleanup 'remove' event [ 1075.972887] kobject: 'ip6_vti0' (00000000f461c3d2): auto cleanup 'remove' event [ 1075.980440] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_uevent_env [ 1075.989291] kobject: 'rx-0' (00000000dd9c5d4e): kobject_uevent_env [ 1075.995694] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1076.008731] kobject: 'rx-0' (00000000dd9c5d4e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1076.019228] kobject: 'ip6_vti0' (00000000f461c3d2): calling ktype release [ 1076.028331] kobject: 'ip6_vti0': free name [ 1076.032732] kobject: 'rx-0' (00000000dd9c5d4e): auto cleanup kobject_del [ 1076.039710] kobject: 'rx-0' (00000000dd9c5d4e): calling ktype release [ 1076.048650] kobject: 'rx-0': free name [ 1076.052666] kobject: 'tx-0' (00000000dd8525f1): kobject_cleanup, parent 00000000e79d8662 [ 1076.061113] kobject: 'tx-0' (00000000dd8525f1): auto cleanup 'remove' event [ 1076.070892] kobject: 'tx-0' (00000000dd8525f1): kobject_uevent_env [ 1076.077384] kobject: 'tx-0' (00000000dd8525f1): fill_kobj_path: path = '/devices/virtual/