yz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1192.114887] loop1: p1 < > p4 [ 1192.121942] loop1: partition table partially beyond EOD, truncated [ 1192.131102] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1192.159001] loop1: p1 size 2 extends beyond EOD, truncated [ 1192.186648] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:14 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000ffffffffffffffff0000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1192.277754] Dev loop4: unable to read RDB block 1 [ 1192.285930] loop4: unable to read partition table [ 1192.297152] loop4: partition table beyond EOD, truncated [ 1192.302855] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:14 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000002000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:14 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0x2000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x3}, 0x8) syz_read_part_table(0x0, 0xaaaaaaaaaaaae76, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1192.331268] loop5: p1 < > p4 [ 1192.334539] loop5: partition table partially beyond EOD, truncated [ 1192.350755] loop5: p1 size 2 extends beyond EOD, truncated [ 1192.366483] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:14 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000003000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1192.404911] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:14 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000000ffffffc900008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:14 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0xe68, 0x2, 0x6, 0x0, 0x9}) [ 1192.487855] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:14 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800015ab70000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1192.537786] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:15 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x2000000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:15 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000004000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1192.588617] Dev loop3: unable to read RDB block 1 [ 1192.593645] loop3: unable to read partition table [ 1192.626802] loop3: partition table beyond EOD, truncated [ 1192.650414] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1192.677634] Dev loop4: unable to read RDB block 1 09:31:15 executing program 2: syz_read_part_table(0x0, 0xf5, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1192.696148] loop4: unable to read partition table [ 1192.721465] loop4: partition table beyond EOD, truncated [ 1192.734230] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:15 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100000001, 0x1) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) 09:31:15 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000005000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1192.779064] loop1: p1 < > p4 [ 1192.789977] loop1: partition table partially beyond EOD, truncated [ 1192.801990] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1192.811553] loop1: p1 size 2 extends beyond EOD, truncated [ 1192.854187] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1192.862383] loop5: p1 < > p4 [ 1192.898818] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1192.921180] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1192.933282] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1192.988129] Dev loop3: unable to read RDB block 1 [ 1193.005724] loop3: unable to read partition table [ 1193.018166] loop3: partition table beyond EOD, truncated [ 1193.023657] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:15 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000020000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:15 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000006000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:15 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x401, 0x3, &(0x7f0000000340)=[{&(0x7f00000000c0)="4d49797e75f4f0ec67a58cdf1180735e14494c7066a41214dd3f6de51498063b81c7a0a77ec5c321c42211d1b0b6f664b1aaeb351457377571b0f559831eaeafa9ade10f92bca712eb1fbea3b8f448944e66579d48d6e13223cd3b55a2d802a2d559fbdc4520d75d1040b6c70df0ac87f8a191b5f459f6105c7c7037fb4b2ff39ddca84a29446381d2d9078c9659582c", 0x90, 0x4}, {&(0x7f0000000180)="b57a993f1ea29ff7a26ac2de5f0d43525563bb54bde9299e1f2919e36120d63b13ff85d2f6083945a229f21ab9c55951e38ae602c86ebb5f5c49d65f1432aa6682fb713415f74234a89eb98903149934d1953510803440148c63141de67e967dd5920b3176b226ba824d72bbb3955d480ac4c8b7b8a04220a71b8d3fb5feb8bdd066ba11fc380ab402f7359876c997cbd9", 0x91, 0x6}, {&(0x7f0000000240)="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", 0xfd, 0x8000}], 0x200004, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'default'}}, {@case_sensitive_no='case_sensitive=no'}, {@errors_recover='errors=recover'}, {@show_sys_files_no='show_sys_files=no'}], [{@uid_gt={'uid>', r1}}]}) 09:31:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000000000001e200008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:15 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800015ab80000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:15 executing program 2: syz_read_part_table(0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0xfffffffffffffe68, 0x1a0}]) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}) 09:31:15 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000008000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1193.171302] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1193.247776] Dev loop4: unable to read RDB block 1 [ 1193.252715] loop4: unable to read partition table [ 1193.277652] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1193.310026] loop4: partition table beyond EOD, truncated [ 1193.328750] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:15 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1f00000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:15 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000010000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1193.358846] loop1: p1 < > p4 [ 1193.377044] loop1: partition table partially beyond EOD, truncated [ 1193.394437] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1193.406567] loop1: p1 size 2 extends beyond EOD, truncated [ 1193.438043] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1193.448012] Dev loop4: unable to read RDB block 1 [ 1193.453133] loop4: unable to read partition table [ 1193.472296] loop4: partition table beyond EOD, truncated 09:31:15 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000001c010000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1193.494513] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1193.517909] Dev loop3: unable to read RDB block 1 [ 1193.528695] loop3: unable to read partition table 09:31:16 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000030000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1193.546290] loop3: partition table beyond EOD, truncated [ 1193.553921] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1193.571470] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:16 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800015ab90000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1193.679006] loop5: p1 < > p4 [ 1193.699071] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1193.736176] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1193.744365] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:16 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000030000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000000ffffffe400008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:16 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000040030000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1193.788961] loop1: p1 < > p4 [ 1193.792116] loop1: partition table partially beyond EOD, truncated [ 1193.827454] loop1: p1 size 2 extends beyond EOD, truncated 09:31:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="b364a77a6715480bff9934a65f5e5949531b9da668601719c553e73221cb9f2011340aa1a42dbdddd95b478eaf0a5255798fb592575932b25b3de6046de1408a87b75bb193b8aa5be90c64320dcf55a18554d5b39099a7ce03b53a653fcc43db23e39def80984e62f28952649e88c1d2339547858ca958e50ab7d17fc461d31d66529a7080e04243b7377c7115c272fb2e91771a17ee0d9065d2edcd3b72ce076615af62ba41bf688a77bebc69fe934ce113aa77739bf481256a07b4978cf53a21d0bd7f71fb9275ee409f1ac6709eb271866e363e1382bc83787260f4019be18481b7572c2fcd3b13fb90d0d9", 0xed, 0x1ff}, {&(0x7f00000004c0)="ef0152136ea31e26af6dc049eb3a63fd7aceb43e6da1f3c314182b47e45564498adc2ee9918bc1ab0d18d4b9b03f349fd2796c7147436a34f9b46095be844dad5e6746fa110b8d3a75112ab8f756758b67bc5ab8a9f1139572936051677a96ed0c595a7b148b17e5727be5a89e861b00b119a5a31a5df273bfb9420c9382170f0b530c38637a83d034153223149d1669ab9af0c803db623ea7d3b009f6a694e328bcf3f4ec55b659cb5799e7d6e0ce48151a80a1cd568f44bcaa18bf3cef8471f56afa4edbb5c8c199e975c4ff5d2defe3cdf397eb17325136f217a827ffa28b99e7903f7f267ac21a5d32826516a1a5863af08a5b934a7182aec8798098b94be4e5e59dbb28e02a14fa20b41504a3822ad005f211c5c7c2126fab0b7ad24075d69e87506e606a13286a10ae5e3d55d35a479bf880491cde68d6168ba2c06554258e543d922f8f8eaecc557f2ac87157c9d95e20816be1a0a3203ee30bf6fe93403de7aa93dbbf458325f708ccce90def80bf38e2273e9702fc697834e06e63319766d8dd53b299294d1ee4dae37afd5ede4af53c61384d626ada4e8b56bf6481b07d8d7cc71bda2c92f8a0bbb8a5e3f3f12c95727f9240cfa51ac6f9a6779751718cfbb070d23d21fe08eb5aebd87d2d3e7f44cb37a3e8994cc7fbc4a8c0686d5ed84c517b079056e9c44b119a7e0e4cf501f0cb095e9ecbe49eea99d7d04ae36ec0cdd5897051979e8c478dc3bd979b46e5ca35924267476f60dca2c89a097044f3a0ca7a951bcfd343f698aebced3ebc4df266b35d108c699f17fe49c50d78fddbf0e59754ab8bfed58cde2ceef328f388ae40d6bd5ab19e2b1f3d7c98660591cedccc39f92910e6469291e6ef37961f57b544b879ed45eae6ddc5e31181abb27f5841ae41ef688037f48c283a6b9ac85e8b4d0406f2247f466acd2fbe40e3c34dfc05e544ef9e750659b3e2bf65e0475bf81c8e0072f352a80f18652776b989a8ddde23edf9788e0fa4af5b6672a8fbcbce919f981e28c62ed2137c6cc9326e02057c6364b729fc6f0935a60f5b220c5b587a179ee21d91ea63b58ad8b09a1c2440b6167efb5435830c58a6bc519c9b78eda33e7dbc2c491a8016760accfe3aebd375921e6bf5eecbb0d2859788364f7e72524d9fa88af14dd67692d7667bb7c035e4de5f8eb65f81c56958542d71180681aa1a3e7cc678866d8669c19d41774d5450cee96eaa63997c7f87a4cb0305f0eff928a62a400ba6fe3fb5fe4ca17e846e9b5b59bc73f6f5dcb1ab3057261572076ce37c387cd9f8f220927d7cb4800c37ae35fce1def9d7490754353aee89a54602c40f5f11a253471923dbf379beb20535d88258a552d334dc0163070778b29b051cbae0e5e20634850dce981a1fc499225428c15b47bb09b59e79bb977d533e76a4b0d712043afa6fe51a810b9f99c81f95e1cb850642a62c5b7ecca1b6b196c058674e906efc7ca2c03e1dc32997295e756bafba2524757beef3380b7d8fa70b197ab7a8cdda9059a2ee04d70e8bdfed59ddf6924f4c5f60e4a1146b7da88b4f336d2b73454a2b9d49a3478c31e5dc0b1a7bd61b52b0042144016cd4374182e6932630de0b304c350981150006b6bb5a8e3475fd94023facfca32d08ef60fb11f86be616130ee42686b8b9450216679eb19ef8374256d72f0f85a6603d2e4d1e5b90ae800a0904b5afba3accad6671800bed10356834f52e086b6212c16406bdafb5d8338c209917ed831ec976c1043946fc23712dd6926ccf696960689b01ad29565d3091b2882963ef6d7ed5695923bb845f4c285dfeed1f5afad86797a6561008d51e2d055b0b43c228565a948fcaae41efdca003abd81932e7099ee828c8f6839475e8f747e1d8b825961d72fc1a7fd0a4a417c7003658fe1001225705e78c4beb888cb2f1ea49953b208fce6ea1be2eb150f64192c2599b4fe3051f891a88d6981f35e2d68a3c110fa7c00ab724f4ff2c1f99bc12c1dc91b7548e8908f8fa36bf673b6a78d274632ee4c91555d97187124597d8784c8aa429d15b83b071cd3e6560bdafed40e0acd72dbd818f0c07ca3b022986889c6a6acd40bd9d6f9a36263d2bdc6674bb2c450cd097200f52175c39cf2968e2345834a9243b7e2de7a57f690d7a1ff724ea3c1de96ca039479a0b354707eab9dc5e9ecde7242b7c2d230aa5f1af6f7712b902c4a99a6ccd7ed878ae27f151e16c7e5ad99118e5a99c858f27c1d2e498b996b14cf6ce381a8ce1b7dedc20e2ace66b944fa2e95bf9a0cb46e2a8ef0236f550ea09bfaafa769bc947d0e1cb22df4d591646f1d2168eb718fccf205d72f45300676e697a3e7e0e763880bd43ab5eb58d642c8d276715d09fbca7f9fa3a05b5bfd178b5e05e7662d6e0c90eb39adb6d7388ce9c8d545489369cfa578fc375b1efd2306bb7279edafda349c820c1d121525d810e6f306822323898364275cb821d8f7ac3f778f7fddebc13c13e1c03615e495dec41924207bdfd624cde1d8f68fd1189bb4a930cef86ada6bb64414f06ba80ac5b07b9be94d8489b3f401ca06986996b7b5da5bb781a33400e26a49d7f8e2b15960da12a7d34b0ac2a589a79ceef8d1450621d2ef098a90055a865415812f011b591cfd533d33ef8708ea91c10c5c913251c427fa5352a931b06ddef46404bc2714741408694ae65fdf7263e231f816c919661e12d0908c97f33f94b0d95e760fd51a2f774821aae69b49b9d377da30a3a00238195a14460cfc0fa706eb3dfe29b1ce645f2beb26945b1a57514f2beb94e6afc0612b7f7fde0991285cf5d3fb5358b403217a185b27faaf74c0d3251f5410926556d216e5821f26547a823d4e3f95d0071e2249e235f3bb6fe87c47d2e1701976bb38ed0330a15465a1a0d16e2d53efb14da2dec0e645b41922fb381be59dc96c5c65f134ab4c5c8a90ad453da2918bd4ff19e476f2c649b5fb9c48b0bbcc61cf331d96e7fd5933aded20398b15fde9004c46001b68a75af9a3b8430e98e65cb177f4f0875f05b48757abf83b04750987fa2bfdb1c428a7df0a85914e56cde14c0290f32d6675fd882ac7de9127587300e66bc30caac53cca2e1bed2ee2f356c2fe93c60e6df5c5171f8cbbd55f385f9c45cec93ed4fc1f7ffc158cd8f8d9593720f4a8fa4346890f2de2b49b09b64f9b32f1f87184b639d759636bba93f73f94eb8403243061b09bcd9715edf2cb82ef6f529c958426c081af7799c9ac457c36348d2ed9cd6ea071472008319bb7b6620a2507927c2cd9b0849ec4d7299fcddc6028d67a43f262c72e48d44801d8a44b8f7fee7499d2a915ab68a4f27c1a200ab1eadb2189d4877fcbe0312774d5f0814b13f4bbb4de31293cbe38d43fbf2eb7f8b7216bd1acbb4a644cc209be138146fefb7da47c61cfbb20c042b0f0ded0c0089d60fe932f717fd8ec37ebaf30e088204d9ab6d2ef1d9a7723992498492a620a71fcc866311a524c5e1d0987fff0aaff31824e17578687237c1dee27245f5aef9778faee42db14e400d2b3ec6ded62a06bdb08d9b6aa6b4025f87db570d4626cc27e8f65c44ae9b0b7da7b8fad26b7dc0c2feac0791b8412a8c8b88ef4049b4a8398a99194cdc76dec76c37a7aa9db6220b3c235e8c6f1c1720c9c174b77178d8aa4e69c0e5536a5579a172fdda3ef577983fe75f267229a53672959943efa1da6657194bf262398e8b6e3874c213f2cfacc111444436ffc12b313988d4cacb93817245d0943d3ca0d2c66282f707b59d67708b185c6de469d67a8a68780deacef2f28f1d9eb606866fee4417bb2cfdaec1452c5dde46d1b219cf3b710ff14a5b735980f069c0bbab0aeae21814977a90b8c6470c02abd0b906cb5efe4b0689ef0b9e253ccdfdd321cb7226330ab5985ed483d229622e59a764e2881cdbaf0f29398417ed73ed5331fb720d52971bacd2fcf2855a28e78059ee6bd6ee670244aa31b9cdf86903a10ce7d27f1ed914a6a14c26ca5b113c9dcf9c46e9cd4b1cad00b1af709bff7f4d3750e165267e6aa0885fb299cd5e5ae9910112d0e6f728e745a9eb460268e34bab04159f5dc83ad4dba3be9975441d69a31b16228038356cc5bd49a80b4b68b9004444fca4ef056d1c1cb945136b9c8728ee55606f50bd1a33051bafb144cf4261ae569804ad3105d9b64c9fb9aef97c90c587bfe628664bab60e9d274d5daf4e4d4911c8a7924b279972ea764130d8c9f384ee6d4f39412ecb765d112b0b8f09ce992bc9712baf631b9436432387009e74cca80034f0b4f7e6ecdc6c9415fad2d161fe586155da3e8d496b309c72b6f8cc434f69008b7b2ccaf8365a6ff4dbd623a86ebc5f917056ccf133f4660db4b72ebca54c514781e1e20eb0af81c5f7c9afacb1dc8a365135ab14f4adb42b3719ccf3c38727c9536c861561eee6bf9666748ba1db35264e9ba3445e2d7baaa0dc8269cf4ef978ce31e563cd7d651baec311f42cddd2dfe677801e0a8247a577fe9da15c9b42667de076a767a2a76d5e1f0ca61534a9e4634b272ec7ad6237e7478e433ffdbe45f0b6c30cf98821bd878080f0dfc820a1b35f86c722e26bbc59c20160e19e14534c833fbecff3ba14fae6f659ac1ddeca9218a6d328e3d709522c70763fb3494fd79f934485102f84ef669c590e24b303cba10c39b2b95002311b6fc5180e5875fb9173255971cca72c66a77b64d0b3773586b82e68f6842dff6b43d897536dc72f6010af45ffd44440d06f5120d5f8abcd6e2a1f3147d1675f6d18d72d7f967a28e5ceec92ccec895e57d1ecc9ecf8e297823baf6a037d5fc5354d31fa884b5a71f2b64024e4beb6bb6f5aa95abddf44e2e2f351097f912ef8a8887f91008e9caff1927728c9793b79ec0cb4f3c381ec6f03dca0433d8855066f313ab585a63858bdeadb8eee3c97f19789e7391b816c92aaf2aca44dc9f858b832e319e24b776d0e332047d698f64d5d06512b308e6b250d4fd30f06ad828689cb4d5fa228af6ec36a61cf3c2fcb2f6c12daf78a865aad72045c3f20ffc64dfcbe185871aa17bd81afa960ff1700507e64808dc0a1a39d94035e9c9aa2a57120eb95e8b309f4a501fd163f93021436cd056ea2097e1d2a4bf547f26986d4e3b49d175154c6aca2b35b078bc65dcb3a31ce16308fd570b8b52f391d2f3ea2812b9a2056c978740e617b7109daf75836e8ddbbed5919bbb13de3e9348bf2726dea2cfff6ab046025c4f1a4008a4488f8a755395c1b37e0d25b058625dcf4b15545e0d03b1b8cd559f6193d8e2afd1fbc7bfad216ebacf5d3fc0248090a98dc747301593633934f9d770dc02a0a6978bb69ad5fc0ebc131eeee2c3da38f7c0ff4eafe62ec6e960c4b9cb4b676b6730ba29330e18109878bfb96f1320e31731713beb051d7b6d07610707ffde461dd8647ceed9ee078125d774449d18ccbbc70c252de461fa214ed27dc53d35256af9c8b677998b2c77e9c0d4bd525f9179d5441a7444521ec5856bdbd907b5722ed763b800eab3b0558914dafec0dc1dcc88ee7a9f6e7258904d0022cda88abead66b0928a6fef10940aefbc68fe3688e07f7c479c1740f5b21491cc2ec28e808d03242dc3b4cd4ee56d2ce50e422ebd2f2a4f6117f83b9f2965fc6a0489853126553082632a9bc34fd235795a584410b89c35409acf45a61451de78a3c272dc7c0544cce1d5b161577763290c9163fbb38622043e83e604e887123806554071ccaf6fc019ef2266e5a0610283df8f4fe0c7a7bd3cee56627", 0x1000, 0xf192}, {&(0x7f0000000180)="9ca6e96d59226321021d244bae59353f79b107802bef806bab6591a824c209cdc9a30a77ae0d39fa76b063d9ffd9352657b5d93adb77ed6078aca46229e2cdc153813bcfa84606c9c11acf9b57e83b73fa98661ce61d1613fc594d0dd8dc180c4c2984a7c62da165068a76234d8f488bf4be8fb2fbfee6aff8dccf776ba33ec4c9e7647d8e794b941109df916fddb3e7dff48da19b9af9852a5770e8489e2cd6c527af128e634f15f6da65c791b4e7", 0xaf, 0x7}], 0x4000, &(0x7f00000002c0)='\\/\x00') [ 1193.854768] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1193.862076] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:16 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000080040000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1193.918399] Dev loop4: unable to read RDB block 1 [ 1193.923529] loop4: unable to read partition table [ 1193.939209] loop4: partition table beyond EOD, truncated [ 1193.952770] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1193.961425] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:16 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000050000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:16 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000380)={'veth0_to_bridge\x00', 0xffff}) syz_read_part_table(0x0, 0xaaaab4f, &(0x7f0000000000)) sched_setaffinity(0x0, 0xfffffffffffffefb, &(0x7f00000004c0)=0x40000000000009) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0xceaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0xfffffffeffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000240)=0x10001) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) socket$inet6(0xa, 0x0, 0x7fffffff) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r4 = gettid() r5 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$inet_buf(r5, 0x0, 0x2d, &(0x7f0000000280)=""/26, &(0x7f0000000300)=0x1a) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000002c0)) tkill(r4, 0x401104000000016) r6 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1f, 0x10, 0x0, 0x101}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000080)={r7, 0x1}, 0x8) 09:31:16 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1400000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:16 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800015aba0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1194.017807] Dev loop3: unable to read RDB block 1 [ 1194.022874] loop3: unable to read partition table [ 1194.047682] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1194.059522] loop3: partition table beyond EOD, truncated [ 1194.077230] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1194.127884] Dev loop4: unable to read RDB block 1 [ 1194.137265] loop4: unable to read partition table [ 1194.152421] loop4: partition table beyond EOD, truncated 09:31:16 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000060000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1194.171982] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1194.180443] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1194.187056] net_ratelimit: 24 callbacks suppressed [ 1194.187064] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.197116] protocol 88fb is buggy, dev hsr_slave_1 09:31:16 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000011c0000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1194.287425] loop1: p1 < > p4 [ 1194.290629] loop1: partition table partially beyond EOD, truncated 09:31:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000000fffffff600008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1194.329463] loop1: p1 size 2 extends beyond EOD, truncated [ 1194.349308] loop5: p1 < > p4 [ 1194.357080] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1194.375751] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1194.395318] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1194.427046] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.427077] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.432134] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.458496] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:16 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000003f0000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:16 executing program 2: stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x100, 0x7, &(0x7f0000000400)=[{&(0x7f0000000680)="376744deb197dcaef724f428b8eabb5914cb5ba715af04103fe501bf45f12acae2d2fe50541465b8c46b0666a2d3dfe688b2ceb353342299939caee42ddae1a4f4f221d123616ebb524bc22685cc5836385bfe07663d9d58726e45902f693abfff016a380bc59b400cebd57b88ec567ecd788df8f8e1b7165b6d50510ce03c6d61", 0x80, 0x3}, {&(0x7f00000001c0)="8ad0128a267a7b794cecda0814", 0xd, 0xffffffffffff1d76}, {&(0x7f0000000200)="bdd6cc86d0efd681a966601eecf30a560e886dcc04418710f4e8e0cb1443efbc", 0x20, 0x5}, {&(0x7f0000000240)="7efd85715d842edd12a1880d78135cd3df6f1ddc9bbed39f4c0b832b5c5c02ad1e4828c90d9b3f91c6e2949e6d18b18ecc5ef95535ffe822", 0x38, 0x4}, {&(0x7f0000000280)="3fa24a2f9aff563fbf6df2dcc1357ed0ee53f7b62225a0961ac4bbac443ad759436b9bb4e7d80f39c935ce6547770fc8ba377c45e43474befa968e3e3f0a84cc9ecb18ba84cb429ac589fd002a22fa46a5c577d7232805b271692ee72e9a606a8501e4a75edde03fc095cbaeb771232300bcfb6a5bcb26ea108ff219c68baba65be87024bf8f721065a6cf496b3128339dc6d1c46e05a9ccf883c7b17d0a7214aa1ed245a60c7ab084daaab60d0477c7e5d296", 0xb3, 0xe07f}, {&(0x7f0000000340)="d7dbdcd0b2a290b979cab4c15d66f6c324e081d79770e0b3a992a1e907ad94fe0c8b382484b420e002d51af8d337bdecd810830cf33518eff8b6704959a1e69c402d7c11e0071c7b5cc66f726aa448fae3296497981dfaa09f9030519e4eef7448821049e864c0cfaf4eb4c57f23c6e8098709832b892bf1b3e24f", 0x7b, 0x7}, {&(0x7f00000003c0)="77866698f8", 0xfffffffffffffeb7, 0x2}], 0x20000, &(0x7f0000000600)={[{@adaptive_mode='mode=adaptive'}, {@noextent_cache='noextent_cache'}, {@data_flush='data_flush'}, {@norecovery='norecovery'}, {@prjjquota={'prjjquota'}}], [{@audit='audit'}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'system_u'}}]}) syz_read_part_table(0x40a3e, 0xaaaaaaaaaaaab27, &(0x7f0000000140)) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x7da, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000580)={0x7, 0x0, 0x4, 0x1000, {}, {0x3, 0x8, 0xb84, 0x400, 0x100000001, 0xcb, "922c7253"}, 0xfffffffffffffffd, 0x3, @userptr=0xfffffffffffffffc, 0x4}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x2000) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000080)={0xf, 0x101, 0x3, {0x4, 0x9, 0x3, 0x80000000}}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000040)={0x10001, 0x32314d59, 0x10001, 0x9, 0x1, @discrete={0x4, 0x1f}}) 09:31:16 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000040000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:16 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068ffffffbf0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1194.498618] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1194.597679] Dev loop4: unable to read RDB block 1 [ 1194.602599] loop4: unable to read partition table [ 1194.637218] loop4: partition table beyond EOD, truncated [ 1194.642935] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:17 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000003400000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1194.676802] loop1: p1 < > p4 [ 1194.692165] loop1: partition table partially beyond EOD, truncated [ 1194.700139] Dev loop3: unable to read RDB block 1 [ 1194.705363] loop3: unable to read partition table [ 1194.716606] loop3: partition table beyond EOD, truncated [ 1194.728821] loop1: p1 size 2 extends beyond EOD, truncated [ 1194.730052] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1194.742499] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1194.783216] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:17 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000004800000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1194.840701] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1194.898496] Dev loop4: unable to read RDB block 1 [ 1194.911905] loop4: unable to read partition table [ 1194.927366] loop4: partition table beyond EOD, truncated [ 1194.954842] Dev loop5: unable to read RDB block 1 [ 1194.971030] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1194.979966] loop5: unable to read partition table [ 1194.987033] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.988891] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1194.992177] protocol 88fb is buggy, dev hsr_slave_1 09:31:17 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000006b6b6b00000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:17 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000050000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1195.007979] loop5: partition table beyond EOD, truncated [ 1195.023371] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 09:31:17 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000000fffffdfd00008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:17 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068ffffffc90000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:17 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000001000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1195.104580] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1195.147733] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1195.187814] Dev loop3: unable to read RDB block 1 [ 1195.192886] loop3: unable to read partition table [ 1195.219746] loop3: partition table beyond EOD, truncated [ 1195.232257] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:17 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xf00000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1195.260244] Dev loop4: unable to read RDB block 1 [ 1195.270850] loop4: unable to read partition table [ 1195.297948] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1195.301637] loop4: partition table beyond EOD, truncated [ 1195.329211] loop1: p1 < > p4 [ 1195.332581] loop1: partition table partially beyond EOD, truncated [ 1195.347278] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1195.358510] loop1: p1 size 2 extends beyond EOD, truncated [ 1195.378131] Dev loop3: unable to read RDB block 1 [ 1195.387039] protocol 88fb is buggy, dev hsr_slave_0 [ 1195.387110] protocol 88fb is buggy, dev hsr_slave_0 [ 1195.392110] protocol 88fb is buggy, dev hsr_slave_1 [ 1195.403613] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1195.410440] loop3: unable to read partition table [ 1195.422359] loop3: partition table beyond EOD, truncated [ 1195.433442] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1195.447910] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:17 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000002000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:17 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000003c0)=r1) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) connect$vsock_stream(r3, &(0x7f0000000340)={0x28, 0x0, 0x2711, @host}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f00000009c0)=0x3f, 0x4) getsockopt$inet_int(r2, 0x10d, 0x2, &(0x7f0000000040), &(0x7f0000000000)=0x1c5) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x66) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0xa, 0x30, 0x8d5, 0xc}, &(0x7f0000000540)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000700)={r4, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x7}}, 0x8, 0x2}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20000fff}) getpeername$inet6(r3, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) sysfs$2(0x2, 0x10000, &(0x7f00000007c0)=""/231) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000200)={0x6, 0xffffffffffff4c08}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0xc020660b, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x980000}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r6 = socket$inet_sctp(0x2, 0x7, 0x84) setsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) sendmmsg(r7, &(0x7f0000001380), 0x3fffff1, 0x40) syz_open_dev$video4linux(&(0x7f0000000380)='/dev/v4l-subdev#\x00', 0x2000400000000000, 0x58d7632da72a2b53) [ 1195.488049] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1195.528683] loop5: p1 < > p4 [ 1195.542559] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:18 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000003000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:18 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000060000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:18 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000000fffffffd00008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:18 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000003d40000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1195.617575] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1195.707547] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:18 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xc00000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1195.747805] Dev loop4: unable to read RDB block 1 [ 1195.760944] loop4: unable to read partition table [ 1195.783527] loop4: partition table beyond EOD, truncated 09:31:18 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000004000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1195.792787] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1195.808814] loop1: p1 < > p4 [ 1195.820047] loop1: partition table partially beyond EOD, truncated [ 1195.838151] Dev loop3: unable to read RDB block 1 09:31:18 executing program 2: syz_read_part_table(0xc3f, 0x0, &(0x7f0000000000)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x7}]) [ 1195.844365] loop3: unable to read partition table [ 1195.857510] loop1: p1 size 2 extends beyond EOD, truncated [ 1195.869883] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1195.874112] loop3: partition table beyond EOD, truncated 09:31:18 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000005000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1195.907704] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1195.908184] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1195.927863] Dev loop4: unable to read RDB block 1 [ 1195.935208] loop4: unable to read partition table [ 1195.954657] loop4: partition table beyond EOD, truncated [ 1195.977965] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1195.984618] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) [ 1196.020279] loop5: p1 < > p4 09:31:18 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000006000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:18 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000001e20000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1196.049903] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1196.058033] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/7, &(0x7f0000000080)=0x7) 09:31:18 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000000fffffffe00008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1196.152441] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1196.209088] Dev loop3: unable to read RDB block 1 [ 1196.214141] loop3: unable to read partition table [ 1196.223608] loop3: partition table beyond EOD, truncated [ 1196.229726] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1196.263315] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:18 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000070000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:18 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000008000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000040)={0x7fffffff, "8ae53caf6b66836585f9bcfc65110d74870bca05e4f1097be9e39836cca1116f", 0x8, 0x2, 0x533, 0x1, 0x4}) 09:31:18 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000003c0)=r1) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) connect$vsock_stream(r3, &(0x7f0000000340)={0x28, 0x0, 0x2711, @host}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f00000009c0)=0x3f, 0x4) getsockopt$inet_int(r2, 0x10d, 0x2, &(0x7f0000000040), &(0x7f0000000000)=0x1c5) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x66) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0xa, 0x30, 0x8d5, 0xc}, &(0x7f0000000540)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000700)={r4, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x7}}, 0x8, 0x2}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20000fff}) getpeername$inet6(r3, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) sysfs$2(0x2, 0x10000, &(0x7f00000007c0)=""/231) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000200)={0x6, 0xffffffffffff4c08}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0xc020660b, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x980000}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r6 = socket$inet_sctp(0x2, 0x7, 0x84) setsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) sendmmsg(r7, &(0x7f0000001380), 0x3fffff1, 0x40) syz_open_dev$video4linux(&(0x7f0000000380)='/dev/v4l-subdev#\x00', 0x2000400000000000, 0x58d7632da72a2b53) [ 1196.379073] loop1: p1 < > p4 [ 1196.386923] loop1: partition table partially beyond EOD, truncated [ 1196.415284] loop1: p1 size 2 extends beyond EOD, truncated 09:31:18 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000002b80)='/dev/midi#\x00', 0x10001, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000002e00)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002c40)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000002d40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002d80)={0x0, @broadcast, @multicast2}, &(0x7f0000002dc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000002ec0)={@initdev, @multicast2, 0x0}, &(0x7f0000002f00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000003000)={@local, @broadcast, 0x0}, &(0x7f0000003040)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000003080)={@multicast2, @empty, 0x0}, &(0x7f00000030c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003100)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000003200)=0xe8) clock_gettime(0x0, &(0x7f0000007800)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000007680)=[{{&(0x7f0000003400)=@un=@abs, 0x80, &(0x7f0000004740)=[{&(0x7f0000003480)=""/164, 0xa4}, {&(0x7f0000003540)=""/233, 0xe9}, {&(0x7f0000003640)=""/193, 0xc1}, {&(0x7f0000003740)=""/4096, 0x1000}], 0x4, &(0x7f0000004780)=""/150, 0x96}, 0x7f}, {{&(0x7f0000004840)=@sco, 0x80, &(0x7f0000004b40)=[{&(0x7f00000048c0)=""/95, 0x5f}, {&(0x7f0000004940)=""/251, 0xfb}, {&(0x7f0000004a40)=""/252, 0xfc}], 0x3}, 0x2000000}, {{&(0x7f0000004b80)=@alg, 0x80, &(0x7f0000004c80)=[{&(0x7f0000004c00)=""/75, 0x4b}], 0x1, &(0x7f0000004cc0)=""/139, 0x8b}}, {{&(0x7f0000004d80)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000006000)=[{&(0x7f0000004e00)=""/4096, 0x1000}, {&(0x7f0000005e00)=""/203, 0xcb}, {&(0x7f0000005f00)=""/109, 0x6d}, {&(0x7f0000005f80)=""/101, 0x65}], 0x4, &(0x7f0000006040)=""/12, 0xc}, 0x3}, {{0x0, 0x0, &(0x7f0000006240)=[{&(0x7f0000006080)=""/190, 0xbe}, {&(0x7f0000006140)=""/25, 0x19}, {&(0x7f0000006180)=""/186, 0xba}], 0x3, &(0x7f0000006280)=""/36, 0x24}, 0x81}, {{&(0x7f00000062c0), 0x80, &(0x7f0000007600)=[{&(0x7f0000006340)=""/156, 0x9c}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/27, 0x1b}, {&(0x7f0000007440)=""/250, 0xfa}, {&(0x7f0000007540)=""/25, 0x19}, {&(0x7f0000007580)=""/112, 0x70}], 0x6}, 0xfffffffffffffffc}], 0x6, 0x40000020, &(0x7f0000007840)={r8, r9+10000000}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f00000079c0)={@mcast2, 0x0}, &(0x7f0000007a00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007a40)={0x0, @empty, @dev}, &(0x7f0000007a80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007b80)={'ipddp0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000007bc0)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000007cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000007d00)={@loopback, @empty, 0x0}, &(0x7f0000007d40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007d80)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000007e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000008040)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008140)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000008240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000009700)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000009740)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000009840)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000009880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000098c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000009900)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000009940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009980)=0x14) getpeername(0xffffffffffffffff, &(0x7f000000a0c0)=@can={0x1d, 0x0}, &(0x7f000000a140)=0x80) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a800)={&(0x7f0000002bc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f000000a7c0)={&(0x7f000000a180)={0x610, r1, 0x708, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0xd0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r4}, {0x4}}, {{0x8, 0x1, r5}, {0x270, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xee1}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0x184, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xe52d}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x401}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r21}, {0x10c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r24}}}]}}]}, 0x610}}, 0x84) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r25 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x82001) getsockopt$inet_IP_XFRM_POLICY(r25, 0x0, 0x11, &(0x7f00000027c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000028c0)=0xe8) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000002900)={0x0, 0x0}, &(0x7f0000002940)=0xc) getsockopt$inet_IP_XFRM_POLICY(r25, 0x0, 0x11, &(0x7f0000002980)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002a80)=0xe8) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x8, &(0x7f00000003c0)=[{&(0x7f0000000100)="21f1ccc3ea82b248b0501f8166b6d836a6e361facf2c18a27902014546d4d9d844040ba6759789e27bccbf226c2b4539699803805e3588ab8113ec983e6ad676fb206cdcbe3dd9e5847b14ea23f5b4eaea3488ee32683ee50a72e45e334a0b866019cfe4f1d0effdc869852356344c6631fe1f9ed5caa4cedc23c56e44ee86f75a001d2772de7c54e63cd9f9dc4246c44ebb472d8180e1f48fae0389de788455a776c79cc1346ef7602adf08d287c6aa49094fbaca7de2b8a257ad7abbd46a7a763a187a4449793b501f5497ac81", 0xce, 0x5}, {&(0x7f0000000200)="0396ba87741c0316fc5a6c6169d74f4165463bcadf3f657928e8da50f20145a2272bd10eff6c67cb4217ddb2ad93658b2fb789bc7aa9eb1e80cb94b6f18a9cd29794fa4822eb83199d7f04f885ef982c1960a0c7842423e70f734054ff8b7aa336118d19007f14be7abcb0648e4785b5bdc80cccaf8f130e9566997753492c4eb19e22358baecf6d74a5f8d715c7b129bc4ae023545e15efd30d81ba5f1f87d9b3cb602ff034ec9d48fe1f707547fcff3f239015ce22ef298519950826420901420c4af330d1f10990d7b9cb13567c1a5d49a8861acf64531f12e28c9b540e107201646e", 0xe4, 0x7ff}, {&(0x7f0000000300)="0d1ba174489517671d2c56dea06156b877705195dbf7ccdb059046179cabd3b1330ec64a14a32f0e80e708fbee63e74b4c6f850d0758ab19d5679913bb4f7a2c8f324378a78fd9595d77aa86d893031aa1c9038590b1ea4f3a31e59fb15dd67a0643565d412f1328857fc345e7dbc3cdc8ac77f6e482cd8f9147e239c9d962e10cc405c08bc0c7ef888a5c1eef606138b0b5b50b6a4960381045ebef64878a441634af01fa4e7254", 0xa8, 0x6}, {&(0x7f00000004c0)="390f96dd415fc4e22499a5eac8ab5286c506941e6296462cee12a117e38267b874f5a53187eaa5a40166615afffc14b575020047db2791c6071bf4e6bd7ac2ed530189e55942531a6a7902af5ea573fb5c7f46de006fcacef4c505ebf6c810ccf546e2e5464225b9dcd5611adcd6fa6274e0ea4fcdeac233a5d5e1d28cdbea661adeb48fa83fa45232985f608c5096daafe80ea4f40567828a21a7ee60bd0458cae65aaf25304ae686d4184c14014fcd1c94e6127cc1e0d13fe7e7b243eecf972844eb46ec18c8a4302b9c7c1db149459a1c0a12be31af610cf40b6f", 0xdc, 0x4}, {&(0x7f00000005c0)="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", 0x1000, 0x6}, {&(0x7f00000015c0)="a8a5bda8b08648f5c62d8c1a07876742f80643bc7d0de434a97fcb466fd53ef2e39f3855a8fe2f94a68c0e99e80393dc1b19b026b31a1867d8ffa7f07d0fae73cad265a7df7e4cbf3a5fe788a86faed3f3a23040bf3ed976eb729cd2d08e601955fc211c5bff8c2e59b345554094c63e1045e8787cab9e743a7432d94720b58dd887ebc3907997983e97ddc09c951cdf5c4e94fa30f277db360de54c299970d79348772ae8d935f9285c2855f83fd4f3755cb3a3866ea216858ab035eaf4e0ddaa133588520792fea22ab91f7ddf4fe28c1539fe8e8666e5ba0dfb8dc047c4bdd8f01477eaab158139aed086efe086fe6d74ba8dbb5974", 0xf7, 0x8cd0}, {&(0x7f00000016c0)="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", 0x1000, 0x5}, {&(0x7f00000026c0)="fa252feb199a659018084d587cbdf989508d41a1b99ba39896a4d081f2f73e1317d8cff569be2eb4f86d0f269962ab5cf7d94e752125b95cbde7e745c859ff9ba9da7b8071a55f0e763f830388e3b202fb326d9973dd3ff2afc7d4e24ee5f1a8b5d38c52869ba6d64d33af6bec3538e082dc44847c41f95f25d31e5c2f24bd18be69ffa1a9f6bea03023450caede61610a169f286bc0474279b12f13ccbddce5d80c65b2a327982883b7744ec992eef0a303a6d69d4bce9cb45d3a40ba82798262fbf93f61865602dc", 0xc9, 0x4}], 0x0, &(0x7f0000002ac0)={[{@dmask={'dmask', 0x3d, 0x6}}, {@umask={'umask', 0x3d, 0x40}}, {@utf8='utf8'}], [{@obj_role={'obj_role', 0x3d, '.^\x81cpuset'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fowner_gt={'fowner>', r26}}, {@fowner_eq={'fowner', 0x3d, r27}}, {@euid_lt={'euid<', r28}}, {@hash='hash'}]}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r25, 0x4008ae73, &(0x7f0000000040)={0x401}) [ 1196.438121] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1196.450715] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:18 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000010000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1196.473969] audit: type=1400 audit(1551519078.886:103): avc: denied { map } for pid=32008 comm="syz-executor.5" path="/selinux/commit_pending_bools" dev="selinuxfs" ino=11 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 [ 1196.501503] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1196.548253] Dev loop4: unable to read RDB block 1 [ 1196.570620] loop4: unable to read partition table 09:31:19 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068ffffffe40000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1196.591402] Dev loop5: unable to read RDB block 1 [ 1196.597047] loop4: partition table beyond EOD, truncated [ 1196.617092] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1196.627982] Dev loop3: unable to read RDB block 1 09:31:19 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000011c000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8040, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001700)=0xed) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000000080)=0x14) sendmsg$xdp(r0, &(0x7f00000016c0)={&(0x7f00000000c0)={0x2c, 0x2, r1, 0x3e}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000100)="83b524c0da2aac7ed1ce2359de76dc62af37136cabf19f08e9e0ba0c988ece500df9d5808cf0285084346dabcf35a61d0788678acb9936819393df62be720179d6e0908c3d27f965ab7fd8b9da73931169ca67185cebb1e973015753efb24598a87352bd769aad95584c876b248a1cdfb13de295ce0ceaad0fac687f46fb5ea9801cb411918ef789428e53d9f76b0152e947df8592b106", 0x97}, {&(0x7f00000001c0)="a74f8c5b27c3948a3119911e102977fab4bb6e9742de2c09b83c024b052c421213f63d8c43257f0ceb99f4a183f1b0fa53b5397a7ad8da999abe4299a5e8dd06781e3829dbba2a6bb201976cda6975845e5ad940b6372c133cf232d31d4a6b123687e5638f4bc25fb678f6e49b597e4fb24ef483d3aa1edf9167d3b139a47fd27463e98ccb99c1014cf388", 0x8b}, {&(0x7f0000000280)="b9ff99dfe962f69be2d4caa0e356a06d05e24753ab05251d24dcac3c35c6349ba89fee05d0d701100bfa004c836e6fac35de63eb9422b5deb4cc6e2157a9d36ecb1f644bad7da438c0c5912324d5d1bd102180dc5cdf37582aba9c5080d34e09d11277417c15705d6b5ad0be6302ee09b19a563f0cda49c19daf34a4abc31305fd65c99000f4775c1026f63b05505c16cfbb8fb4079de348fba40cdb1d21e3bcf99c0f3d1c347b354c3c2aa74bd6c916d3085e099f52d9a5f05bf2b485cb3f755b449e6768da4b9fbf76ed1429780f5b5bece21fdb", 0xd5}, {&(0x7f0000000380)="dff4389898778640c3b789ec800e7ef70c8b93f2609a501a0d0b1a34e2aa29c06ba9c6d347753d4c6e4c54f3ea60aa089bb7c6cce46f825579f6ceb8d434b96bd25b21357eae3a10eb7abd59526436d0b1c803f43e2c75f875374b16d9136e85c530bada772fed417b5837416171856415c8391913f7b2bc4f852bfcda7bcdb13296461d134d2556f17ecc501203fc3fe1924567e9b755e29db07535b37d8e463dfbe70ee65c6799888a5430b3a0ecb38b04c7908f5dad860655b9b843468d20cf63e46cd6b2e5b5635726b33e237d9586de3adbe708cff268621c55387add", 0xdf}, {&(0x7f00000004c0)='N', 0x1}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="e29314c4562867fe81328b89b3df13d10af3aff9c8aa351079677dcaee81d47aa5efb93e78cf1470e4de3edf75887b5a96ec50bd0e4340e6a1270f12eb8933b5eed168aca4afc551534d2216a04d2c696304127fa549139dc5c1c516680a928f2135ce4b06e8e800a61b6e4e597e2e5138a23088505008cc2b157da2381157d2827e4e96e90b9d6e8ff394f5f52087536eec2c12815b29b788f8fe35ee3d99d418a2e47117ff692e04cfc4817996e3f34047f1a1b5dca9e037447e135a158d16258e740e2f2bb09d55a2f8ab0b7c808dc6f14720231d5270ed7124815b4fc23ffb89f2557d57b6752c7bd81fbd6ca5219c0d4298444edc02cbb3ddad", 0xfc}, {&(0x7f0000001600)="25707cc2448153f53ff4d16e25d8e6", 0xf}], 0x8, 0x0, 0x0, 0x8000}, 0x90) [ 1196.647442] loop3: unable to read partition table [ 1196.653677] loop5: unable to read partition table [ 1196.660908] loop3: partition table beyond EOD, truncated [ 1196.676537] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1196.687924] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1196.711012] loop5: partition table beyond EOD, truncated [ 1196.726102] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 1196.741639] loop1: p1 < > p4 [ 1196.746008] loop1: partition table partially beyond EOD, truncated 09:31:19 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000200)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x27, 0x3, 0x0, {0x5, 0x6, 0x0, 'md5sum'}}, 0x27) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r1 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BLKRRPART(r1, 0x125f, 0x0) 09:31:19 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000003f000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1196.765609] loop1: p1 size 2 extends beyond EOD, truncated [ 1196.800117] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:19 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000000000000000fff00008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1196.830020] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1196.918112] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1196.968802] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:19 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000090000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:19 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000340000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) [ 1197.117776] Dev loop4: unable to read RDB block 1 [ 1197.122766] loop4: unable to read partition table [ 1197.170810] loop4: partition table beyond EOD, truncated [ 1197.206087] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1197.227835] Dev loop3: unable to read RDB block 1 [ 1197.235125] loop3: unable to read partition table [ 1197.248387] loop3: partition table beyond EOD, truncated [ 1197.263069] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1197.272816] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1197.328679] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:19 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6b6b6b00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:19 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000003ee0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1197.392899] Dev loop4: unable to read RDB block 1 [ 1197.400435] loop4: unable to read partition table [ 1197.423821] loop4: partition table beyond EOD, truncated [ 1197.429475] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:19 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x1) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0xffffffffffffffda, 0x5, {0x0, 0x1}}, 0x20) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x3, {0x2, 0x1, 0xfffffffffffffffb, 0x80000000, 0x401, 0xcc}}) syz_read_part_table(0x23, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="000068000000000000000000000000008128b14718ac185af8ff4dadaff619ae00000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c00000552702345beb9f4089344faafabd8f963d97a809812c615f00941e85105b07d5cdda11f97e064ab51d00abc5cc5374c885be968baadb489d251ab28cfadac2ae", 0xaa, 0x1a0}]) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@default) 09:31:19 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:19 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000180)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x240002, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f00000000c0)=""/114) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x60000) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000040)) 09:31:19 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000480000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1197.457800] Dev loop3: unable to read RDB block 1 [ 1197.474138] loop3: unable to read partition table [ 1197.487250] loop3: partition table beyond EOD, truncated [ 1197.494090] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:19 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000007fffffff00008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:20 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000c0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:20 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000fffffff6000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1197.620915] loop1: p1 < > p4 [ 1197.626219] loop1: partition table partially beyond EOD, truncated [ 1197.650704] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:20 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x9, 0x3, 0x10, &(0x7f0000ffc000/0x4000)=nil, 0x9}) [ 1197.671162] loop1: p1 size 2 extends beyond EOD, truncated [ 1197.701283] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1197.710208] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:20 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000fffffdfc000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1197.745122] loop5: p1 < > p4 09:31:20 executing program 2: [ 1197.778901] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1197.801497] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1197.858222] Dev loop3: unable to read RDB block 1 [ 1197.865817] loop3: unable to read partition table [ 1197.879254] loop3: partition table beyond EOD, truncated [ 1197.888954] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1197.903778] Dev loop4: unable to read RDB block 1 [ 1197.918565] loop4: unable to read partition table [ 1197.931886] loop4: partition table beyond EOD, truncated [ 1197.943170] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1197.953587] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:20 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000003ee0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:20 executing program 2: syz_read_part_table(0x37, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="0000680000000000e6ff00000000000081280979b1ebdab14700000000d59863d20000000002000f2020cc00000000ff0700010000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0xffffffffffffff1b, 0x1a0}]) 09:31:20 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000fffffffe000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:20 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068ffffffee0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1198.000465] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1198.037661] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:20 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000100000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:20 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000fcfdffff000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1198.117701] Dev loop4: unable to read RDB block 1 [ 1198.122618] loop4: unable to read partition table [ 1198.148411] loop4: partition table beyond EOD, truncated [ 1198.169246] loop1: p1 < > p4 [ 1198.171960] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1198.173669] loop1: partition table partially beyond EOD, truncated [ 1198.220135] loop1: p1 size 2 extends beyond EOD, truncated [ 1198.230361] loop5: p1 < > p4 [ 1198.233531] loop5: partition table partially beyond EOD, truncated [ 1198.254276] loop5: p1 size 2 extends beyond EOD, truncated [ 1198.261798] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:20 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000000ffffffff00008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:20 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1198.278947] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1198.308003] Dev loop3: unable to read RDB block 1 [ 1198.315382] loop3: unable to read partition table [ 1198.327326] loop3: partition table beyond EOD, truncated [ 1198.333213] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1198.341288] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:20 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1198.388019] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1198.417514] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:20 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fffffff40000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1198.477958] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:21 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000c0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1198.547946] Dev loop3: unable to read RDB block 1 [ 1198.552867] loop3: unable to read partition table [ 1198.565834] loop3: partition table beyond EOD, truncated [ 1198.583865] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:21 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000001008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1198.611642] Dev loop4: unable to read RDB block 1 [ 1198.628158] loop4: unable to read partition table [ 1198.647215] loop4: partition table beyond EOD, truncated 09:31:21 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000120000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1198.675153] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:21 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x10000, 0x10, 0x4, 0xfffffffffffffffa}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x9, 0x6cd, 0x2}, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) 09:31:21 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffff07008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1198.731618] loop1: p1 < > p4 [ 1198.734905] loop1: partition table partially beyond EOD, truncated [ 1198.767395] loop1: p1 size 2 extends beyond EOD, truncated 09:31:21 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='schedstat\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000100)=""/231, 0xe7}, {&(0x7f0000000200)=""/244, 0xf4}, {&(0x7f0000000300)=""/20, 0x14}], 0x4, 0x5) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) [ 1198.781866] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1198.798050] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:21 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1198.848043] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1198.893048] Dev loop5: unable to read RDB block 1 [ 1198.904483] loop5: unable to read partition table [ 1198.922142] loop5: partition table beyond EOD, truncated [ 1198.934796] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 09:31:21 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1ff, 0x400) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e20, 0x6ec3be6a, @rand_addr="a689f088d218bbd3c0db542fb5df4f89", 0x1000}}}, 0x84) [ 1198.943981] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:21 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000f0ffffffffffff00008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:21 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000018a6e94c0000055aa", 0x60, 0x1a0}]) [ 1199.008826] Dev loop3: unable to read RDB block 1 [ 1199.026183] loop3: unable to read partition table 09:31:21 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fffffff50000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:21 executing program 2: syz_read_part_table(0x2, 0x314, &(0x7f0000000480)) rt_sigreturn() [ 1199.053499] loop3: partition table beyond EOD, truncated [ 1199.073051] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1199.083175] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1199.137880] Dev loop4: unable to read RDB block 1 09:31:21 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000028a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:21 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x9) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1199.160370] loop4: unable to read partition table [ 1199.178090] loop4: partition table beyond EOD, truncated [ 1199.193800] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1199.202994] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1199.287253] loop1: p1 < > p4 [ 1199.290672] loop1: partition table partially beyond EOD, truncated [ 1199.298330] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1199.319944] loop1: p1 size 2 extends beyond EOD, truncated [ 1199.338355] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1199.357788] Dev loop3: unable to read RDB block 1 [ 1199.362880] loop3: unable to read partition table [ 1199.377042] loop3: partition table beyond EOD, truncated [ 1199.382518] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1199.401848] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:21 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000140000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:21 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:21 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000038a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:21 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x80ba, 0x4, 0x7f, 0x9fe}, 0x10) 09:31:21 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000ffffffffffffffff00008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1199.508143] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1199.547027] net_ratelimit: 25 callbacks suppressed [ 1199.547035] protocol 88fb is buggy, dev hsr_slave_0 09:31:21 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fffffff60000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:22 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000048a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:22 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='(lo&\x00') syz_read_part_table(0x2, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0xffffffffffffffa9, 0x1a0}]) syslog(0x9, &(0x7f0000000040)=""/36, 0x24) write$nbd(r0, &(0x7f0000000140)={0x67446698, 0x0, 0x3, 0x3, 0x2, "42c954528280c98084f916f1e7ee39733bc611051604cd98cd63a25b32fe25e1aa0a1d1ad447665b5b710b9347ddb2110071ac2051e0247519cbd074f2d6c0dd2dd377d1bf016679f30b0fe14f56f73a6ea9f5569865e4ffe7808a37340becdfa4cee4ee8d2e8b132f080027baa11fb3145f3a73e30e0376fe70522f8164ff9f46b6af1e1b6fd283ea0d5ef7f9f7954690071711c1a93332e5cb70557ec87abe7aa0865075374eaeb06ff3bf169908df2bd4bb87fbee4e5ec2afce7355a460b6ae25e89709dd1f7f277f6515dceb8d53b7ad7853485556c5b2"}, 0xe9) [ 1199.547042] protocol 88fb is buggy, dev hsr_slave_0 [ 1199.547086] protocol 88fb is buggy, dev hsr_slave_1 [ 1199.552103] protocol 88fb is buggy, dev hsr_slave_1 [ 1199.578016] loop5: p1 < > p4 [ 1199.582662] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1199.627093] protocol 88fb is buggy, dev hsr_slave_0 [ 1199.632651] protocol 88fb is buggy, dev hsr_slave_1 09:31:22 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 09:31:22 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000058a6e94c0000055aa", 0x60, 0x1a0}]) [ 1199.654124] audit: type=1400 audit(1551519082.056:104): avc: denied { syslog } for pid=32200 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 1199.680793] Dev loop4: unable to read RDB block 1 [ 1199.697456] loop4: unable to read partition table [ 1199.714749] loop4: partition table beyond EOD, truncated 09:31:22 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x12c00, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f00000000c0)={0x217, "d559e0b19feb76fe9c95e18831539df589131d37bf2760b46864967e97494371", 0x200, 0x6c0, 0x8, 0x10, 0x4}) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000140)="135b75f61da9832675dc635b02cdd7e403557bccc40a7fb9a08b419003a61e54d86cf8849c4848207ef3772aa70e3d273e1afa5efa97f0d4a356c7d35bc6ef4dfdd559681dd11476f5412a56def33fc7dbc2bdbf7464958deb40a5a13af6ed4f90910dec1b557c698919126a2498635419b207363fab08c2543704c3d74510509dac31815f2e1a6c6c6d10cf7ea2f4ab209bc7681513d8b797f4af73d324f6711392ba3a47376d280213dae7d523553916b332d59814249560b31b95c4f1a2478f17ab8a88b0933ba822ce55095fbb96dd2de41686fc342c172ce62e896a2f27e069e0a978399030c0aa239e", 0xec}, {&(0x7f0000000240)="a129adba42463e9f2ba28f3f5be63022695f67180df2fcb082f648ee1a621e07b812f5058013387dca8dd137d4679514b5971455ed78e55b60de15a50d617798f514b699ccfc6d084a86f8e78339885d941e7988a454512f56b9a33d475e92fafb39dd79284c0b5e43010870335706ade0e78fd61cf9e848a490623e15f36978524f30d7c49c3a70ec3c0d041fc91c915be95f420f4d516db2f587", 0x9b}], 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80010000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x34, r1, 0x201, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xde}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000800) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$UHID_DESTROY(r0, &(0x7f0000000340), 0x2ea) [ 1199.720905] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1199.741586] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1199.808635] loop1: p1 < > p4 [ 1199.813702] loop1: partition table partially beyond EOD, truncated [ 1199.822868] Dev loop3: unable to read RDB block 1 [ 1199.830407] loop3: unable to read partition table [ 1199.842889] loop3: partition table beyond EOD, truncated 09:31:22 executing program 2: r0 = geteuid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xc8, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="e97a3544b22311375fad8499fa674b29ba7d65748c86a8c38176ce2cbd1393f4688396fdcae957601026bd12c0466d6d8da886eaa7461705e8c826beb4ae51716459803ed27adf777164001c187f0e56afd397d1d032d41f646472002eeab0", 0x5f, 0x4c00}], 0x10, &(0x7f0000000200)={[{@errors_continue='errors=continue'}, {@case_sensitive_yes='case_sensitive=yes'}], [{@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, 'cpuset'}}, {@euid_eq={'euid', 0x3d, r0}}, {@fowner_lt={'fowner<', r1}}, {@dont_measure='dont_measure'}, {@measure='measure'}, {@fsname={'fsname'}}, {@obj_type={'obj_type', 0x3d, 'mime_typevboxnet0eth1&self@proc,system'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vmnet0$'}}]}) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) ptrace(0x8, r2) r3 = accept(0xffffffffffffff9c, &(0x7f0000000380)=@nl=@proc, &(0x7f0000000400)=0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000440)={0x0, 0x101, 0x30, 0x1, 0x1}, &(0x7f00000004c0)=0x18) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={r4, 0x5}, &(0x7f0000000540)=0x8) [ 1199.855346] loop1: p1 size 2 extends beyond EOD, truncated [ 1199.858880] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1199.871872] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1199.928171] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1199.938606] Dev loop4: unable to read RDB block 1 [ 1199.943620] loop4: unable to read partition table [ 1199.959526] loop4: partition table beyond EOD, truncated [ 1199.975066] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1199.984078] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1200.034049] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1200.158060] Dev loop3: unable to read RDB block 1 [ 1200.162974] loop3: unable to read partition table [ 1200.175448] loop3: partition table beyond EOD, truncated [ 1200.181383] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1200.197585] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:22 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000230000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:22 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000068a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:22 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:22 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x113, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:22 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000200000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:22 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000025fa0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:22 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a1}]) 09:31:22 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000088a6e94c0000055aa", 0x60, 0x1a0}]) [ 1200.377978] Dev loop4: unable to read RDB block 1 [ 1200.385777] loop4: unable to read partition table [ 1200.392383] loop4: partition table beyond EOD, truncated [ 1200.408092] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1200.417901] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:22 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0xd, 0x1a0}]) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x101000) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/223) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000180)=0x200000000) 09:31:22 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000108a6e94c0000055aa", 0x60, 0x1a0}]) [ 1200.427075] protocol 88fb is buggy, dev hsr_slave_0 [ 1200.432216] protocol 88fb is buggy, dev hsr_slave_1 09:31:22 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) pipe(&(0x7f0000000000)) 09:31:22 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000011c8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1200.489029] loop5: p1 < > p4 [ 1200.507866] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1200.528200] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1200.582699] Dev loop3: unable to read RDB block 1 [ 1200.596754] loop3: unable to read partition table [ 1200.614351] loop3: partition table beyond EOD, truncated [ 1200.633455] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1200.653455] loop1: p1 < > p4 [ 1200.661208] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1200.667017] protocol 88fb is buggy, dev hsr_slave_0 [ 1200.668092] protocol 88fb is buggy, dev hsr_slave_0 [ 1200.686664] loop1: partition table partially beyond EOD, truncated [ 1200.699998] loop1: p1 size 2 extends beyond EOD, truncated [ 1200.719285] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1200.737718] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1200.790782] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1200.849394] Dev loop3: unable to read RDB block 1 [ 1200.865715] loop3: unable to read partition table [ 1200.876554] loop3: partition table beyond EOD, truncated [ 1200.886480] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:23 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000280000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:23 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x2, "f0e992c2b5f31fe65ff293944111c814f6d6dc8dc83c6be57d136f8db41da53b", 0x1, 0x1}) 09:31:23 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f8a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:23 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000300000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:23 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fffffffb0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:23 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000003408a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:23 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x542, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x1e}}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000200)={[{0x1, 0x7, 0x180000000000, 0x3, 0xff, 0x7, 0x6141, 0x9, 0x644, 0x9d4f, 0xd6, 0x94, 0x5}, {0x9, 0x9, 0x10000, 0x15dce162, 0x8, 0x9, 0x7fffffff, 0x7, 0x8, 0x10001, 0xb2, 0x7f, 0x9}, {0x1ff, 0x8000000000000000, 0x80000001, 0xfff, 0x401, 0x0, 0x4, 0x1ff, 0x7, 0x4588bcf4, 0x7, 0x7fff, 0x3ff}], 0x8}) r2 = dup(r0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x3}, 0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r1, 0x6438}, 0x8) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1201.037818] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1201.078070] Dev loop4: unable to read RDB block 1 [ 1201.084186] loop4: unable to read partition table [ 1201.096528] loop4: partition table beyond EOD, truncated [ 1201.111173] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1201.139849] loop1: p1 < > p4 [ 1201.143001] loop1: partition table partially beyond EOD, truncated [ 1201.157409] loop1: p1 size 2 extends beyond EOD, truncated 09:31:23 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000808a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:23 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x5, 0x4) [ 1201.196192] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1201.217971] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:23 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000004808a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:23 executing program 2: syz_read_part_table(0x2, 0xaaaaaaaaaaaad1d, &(0x7f0000000080)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x6, 0x10001, 0x8, 0x100000000}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r1, 0x10000}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000100)={r1, 0xcb, "3fae5ca3c8903bc7929aab7526ad904cc1ea25a9851313486d91244949fed44db6c55c92f71e4442c9b40af266544eddff5ff37593272a39a1e033251f78c0e9c855eeee9cb7c54cb15b02a1eab29d68249235cee665da8299fd2c5b9cd4b359dec7eff4ac1144d554f661b93f95194dd77940f981f69d9c2e2168a32a0f62e63fff5c2f0b0fcd53d79c821ed987d5f92e0bd5249d7f4ed932f8a6f2a0591c2c972c463a658c6e879eacc44f2c815f8cb2baa6d19a903c4467e53c169aabf722614e8795ec169139895671"}, &(0x7f0000000200)=0xd3) [ 1201.299665] loop5: p1 < > p4 [ 1201.311301] loop5: partition table partially beyond EOD, truncated [ 1201.319283] Dev loop3: unable to read RDB block 1 [ 1201.327053] loop3: unable to read partition table [ 1201.342320] loop3: partition table beyond EOD, truncated [ 1201.355037] loop5: p1 size 2 extends beyond EOD, truncated [ 1201.364323] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1201.375538] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1201.420122] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1201.468114] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1201.534016] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1201.617655] Dev loop3: unable to read RDB block 1 [ 1201.622570] loop3: unable to read partition table [ 1201.637046] loop3: partition table beyond EOD, truncated [ 1201.642533] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:24 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000480000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:24 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000400000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:24 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fffffdfd0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:24 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff68a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:24 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4000, 0x0) timer_create(0x7, &(0x7f0000000000)={0x0, 0x16, 0x5}, &(0x7f00000001c0)=0x0) timer_settime(r1, 0x1, &(0x7f00000002c0)={{}, {0x77359400}}, &(0x7f0000000300)) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0xc0000, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x20100, 0x0) io_submit(0x0, 0x2, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x7, r0, &(0x7f00000004c0)="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", 0x1000, 0x7fff000000, 0x0, 0x2, r2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000100)="b3a72a4a28fe76488b8a42aad946a87deca22054573b1659c4a632ef4bde56478f1e8c1788e3d961d41d645190516880e2546e87783f3e38aba05158a2649da431b2647362b687ea3569f2d9b15aea246aa4c4e6c1e159273d60eca5ecf3b7dfdec9b145cbb2a7936dc4396915421e388b25daf9d0aa7406a23cedcdfd04a596a7df2c9982b4201fd387d3eb4e4054739b43a2ca58bf8b", 0x97, 0x1ff, 0x0, 0x0, r4}]) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:24 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfc8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1201.788439] Dev loop4: unable to read RDB block 1 [ 1201.797556] loop4: unable to read partition table [ 1201.813480] loop4: partition table beyond EOD, truncated [ 1201.821561] loop1: p1 < > p4 [ 1201.824797] loop1: partition table partially beyond EOD, truncated 09:31:24 executing program 2: syz_read_part_table(0x0, 0x8a, &(0x7f00000001c0)=[{&(0x7f00000004c0)="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", 0x0, 0xfffffffffffffff7}, {&(0x7f00000000c0)="e973fc975ad5b80827756cff917af082f7eb65231e99b4afcd0771ff63e0237263bd004f19de4b41bd3927029581e8c2005d802122ad4fdec8df48d41668f7495d9ee346dc80ccd8d945", 0x0, 0x4}, {&(0x7f0000000240)="45443b2455b5c4a0077795f38027dcf5ccbd3d5bcd853ff2290fb23d421ca2e6eab9e2de8200122b14df7d55c5bf14d53113ce24ce26140638beec971f55d7e4cc77cfae024eaf5a7d682e319f4cbaf0", 0x0, 0x8}]) [ 1201.842492] loop1: p1 size 2 extends beyond EOD, truncated [ 1201.862332] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:24 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffe8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1201.887732] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1201.914443] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1201.929530] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:24 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000140)={@loopback, @rand_addr, 0x0}, &(0x7f0000000180)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x9, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2c3, 0x0, 0x0, 0x0, 0xdb3}, [@map={0x18, 0x1, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8858, 0x0, 0x0, 0x0, 0x3}, @alu={0x4, 0x6, 0x7, 0x9, 0x7, 0xfffffffffffffff0, 0x8}, @ldst={0x2, 0x3, 0x7, 0x8, 0x3, 0x3e, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x2df, 0x17, &(0x7f0000000100)=""/23, 0x41100, 0x1, [], r1, 0xf}, 0x48) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:24 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1202.027967] Dev loop3: unable to read RDB block 1 [ 1202.036788] loop3: unable to read partition table [ 1202.051829] loop3: partition table beyond EOD, truncated [ 1202.058779] Dev loop4: unable to read RDB block 1 [ 1202.063698] loop4: unable to read partition table [ 1202.079169] loop4: partition table beyond EOD, truncated [ 1202.085847] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1202.100920] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1202.109679] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1202.171035] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1202.297924] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:24 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000004c0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:24 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000006}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="2800f0ff", @ANYRES16=r1, @ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x4011}, 0x41) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) 09:31:24 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000007ffffffffffff8a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:24 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fffffffd0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:24 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000500000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1202.404566] loop5: p1 < > p4 09:31:24 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1202.424815] loop5: partition table partially beyond EOD, truncated [ 1202.453710] loop5: p1 size 2 extends beyond EOD, truncated [ 1202.469872] loop1: p1 < > p4 09:31:24 executing program 2: syz_read_part_table(0x0, 0xaaaaaaaaaaaade9, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1202.477943] loop1: partition table partially beyond EOD, truncated [ 1202.500815] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1202.515853] loop1: p1 size 2 extends beyond EOD, truncated [ 1202.522298] Dev loop3: unable to read RDB block 1 [ 1202.530993] loop3: unable to read partition table 09:31:25 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000020000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1202.554410] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1202.560140] loop3: partition table beyond EOD, truncated [ 1202.586683] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1202.594568] Dev loop4: unable to read RDB block 1 [ 1202.599775] loop4: unable to read partition table [ 1202.611795] loop4: partition table beyond EOD, truncated [ 1202.624774] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1202.637547] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1202.669178] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:25 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000030000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:25 executing program 2: syz_read_part_table(0xfffffffffffffffd, 0x1cbda7aad953de7, &(0x7f0000000480)) [ 1202.725175] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1202.785436] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:25 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fffffffe0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:25 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000600000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:25 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000040000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1202.867125] Dev loop4: unable to read RDB block 1 [ 1202.872081] loop4: unable to read partition table [ 1202.895270] loop4: partition table beyond EOD, truncated [ 1202.902192] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:25 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000050000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:25 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000600000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:25 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000380)=0xe8) fstat(0xffffffffffffff9c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="c7607c0522608ee18aa2a57be6ec581794a63379ff9b7e938ddd9d0008d1ee265191b168e349b420621f69db78523176e8e23ab305a3f0c345929a16c26ba815759e184748265af044202a3e6a989d94d09441d9eb9a966e640cd253d9d827b6ccb2985f8949a578551538f34358", 0x6e, 0x1}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000100)="c9ab717ba696b6f1e8e3c25c39ef7a37e76c154e7f917d3cd6aa3bb13daba09a6f49d30912c189329375aa1cfa3ba7650178329029f667301b644a854f2803a125cf376c06b45939", 0x48, 0x6d6}, {&(0x7f0000000180)="60611191836830e9ce43900a24d2521aa162f47e7f0ade5316901c199f0248b10103705cf4e69ed4a44048d979b11af2133eae1acabb6bfc9fa47b76fc03d26379d42cbc88e0ba904190f5d2f06416c14418b330466811abef486f428a079efbc6b2e682797f85", 0x67}], 0x404, &(0x7f00000015c0)={[{@shortname_mixed='shortname=mixed'}, {@shortname_lower='shortname=lower'}, {@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@utf8='utf8=1'}, {@uni_xlateno='uni_xlate=0'}, {@shortname_lower='shortname=lower'}, {@uni_xlateno='uni_xlate=0'}, {@shortname_mixed='shortname=mixed'}], [{@uid_lt={'uid<', r0}}, {@fsname={'fsname', 0x3d, 'selinux/ppp0!\\bsecuritysystem'}}, {@euid_gt={'euid>', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role', 0x3d, 'ppp1'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r4}}]}) [ 1203.082282] loop5: p1 < > p4 [ 1203.095045] loop5: partition table partially beyond EOD, truncated [ 1203.111296] loop1: p1 < > p4 [ 1203.116678] loop5: p1 size 2 extends beyond EOD, truncated [ 1203.122646] loop1: partition table partially beyond EOD, truncated 09:31:25 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000060000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1203.142023] loop1: p1 size 2 extends beyond EOD, truncated [ 1203.158357] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1203.175460] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:25 executing program 2: syz_read_part_table(0x0, 0xaaaaaaaaaaaaac9, &(0x7f0000000000)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x7) [ 1203.198254] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1203.206276] Dev loop3: unable to read RDB block 1 [ 1203.217173] loop3: unable to read partition table [ 1203.222525] loop3: partition table beyond EOD, truncated [ 1203.241892] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:25 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000080000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1203.271195] Dev loop4: unable to read RDB block 1 [ 1203.282550] loop4: unable to read partition table [ 1203.300852] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1203.313354] loop4: partition table beyond EOD, truncated [ 1203.329914] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1203.331061] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1203.388786] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:25 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000100000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40242, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1203.437634] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) 09:31:25 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000fff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1203.500204] Dev loop3: unable to read RDB block 1 [ 1203.513284] loop3: unable to read partition table [ 1203.527313] loop3: partition table beyond EOD, truncated [ 1203.543172] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1203.551162] Dev loop4: unable to read RDB block 1 [ 1203.563900] loop4: unable to read partition table [ 1203.583617] loop4: partition table beyond EOD, truncated [ 1203.597169] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1203.609093] loop1: p1 < > p4 [ 1203.612227] loop1: partition table partially beyond EOD, truncated [ 1203.643725] loop1: p1 size 2 extends beyond EOD, truncated [ 1203.662596] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:26 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000680000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:26 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = syz_init_net_socket$ax25(0x3, 0x7, 0xfe) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/110, &(0x7f0000000080)=0x6e) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x40, 0x8000) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000100)={0x3a, 0x2, 0x6, 0x7, 0x1}) 09:31:26 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000001c0100000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:26 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000700000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:26 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) syz_read_part_table(0x1, 0xa, &(0x7f0000001c80)=[{&(0x7f0000001500)="988473db288a10ebb3b601d9314f6e01b13999488d380f8c0add869b8cf7fb2ef3231753f5dc756690934916f07a25ce0bcc94608573ccdc256122ca34af2757275be2a52a4db5f9e6a4615714cb353c534ad75c4a7895f640c57c3a8e37d52d", 0x60, 0x6}, {&(0x7f0000001580)="3e2b127a05d6e98b6f35bbd9548eef5a91fa067c0bb04f479cc3f9cbcbde8d97533b860a871be59552501c26f00f2943b3180b4ae6", 0x35}, {&(0x7f00000015c0)="dbe272b9155c220a189213d08914a5629e4032cb8ae59ef8b6a9f4efada786c1a94d00ca822e30b418f180ae50e759a0dfef81eb23a0e6d4179cf2e4bb9ec3506277ca5d87bd8f10b311a7c37b0313655e4a66562a33cfab032483a03cf1cacc5d06b74d32a82db1aeb0e5865af3d55cebfb2b08ec17c36a5fe45a627e92460c42f9f8d8c0c073d801c99078c97f7b4cf31e9eb275cd0714e89bd0c8985e9202cf53d2b5b75b937d17cddcd8cafb9bc36aafbc08fd6b36156725bc11d1dedf172f2fcf36323fbfd54b41abe83f9c9ae7c9e05d38a81a44af8e1cb25a1409b5aed4cc0a404c206a59a9552ece762283", 0xef, 0x100000001}, {&(0x7f00000016c0)="92cbeb4f23a00051ce289f5ce5be291522b6c3723eecd268190fa5f3677564bd18ad392afe08d78a8989fecc4a3afdbc28c91c1ef6c4bbbac959175a431948a787fbf23b9abf334b45549489a9e8086119d734c850", 0x55}, {&(0x7f0000001740)="f85dbe52f688b78e1ae905e70b2f1f8c96cc9e87eb0e0c48c47f06c79e3fb9c284503a1804e6854b106ffa81eacfb23db958946585da475c02d6a4e135b9c471252d05c461e8334fedf14725121a16cca0874f0b24bbadf080f70d241f7b9697af015c42f08d0d3c714f6e77ebf4c0a7bcb36d1046b794bec20a7827a5683f5b4110c65b61423cd9dc62b4eddca556c3c9", 0x91, 0x2}, {&(0x7f0000001800)="65e09e15344799e766ad43358e597c86f5d1052813846dc775da70e36a5d0027a26d785d9c47be959cab3b64a3598cf11a5657d90bb245e41f7aef6a930239a95fb9e22c1879e490c651b6086c7710b9e1f08f879957f16a95c923cfc36c91448bb7e5235b6e9847a1b432ef2a77d8544b40e9452cc61f79ee1a68d7e50a5941a2", 0x81, 0x8}, {&(0x7f00000018c0)="7235c55531dffebaef4a40b0149f0a3cf0b405530a8495d5326910d9716bbbd6dd9f2cab0278bf02fac6260658ff174b2eb43eb8d508acae530157a56f787041006f32532fa85ceae14bc36a2ad7c9c940dcb30af3d513683046ac5a7216fcacbf7f1eccf5a01a12500817bb209d40ff1bb4e9c824f2bb055958aea80c7b58cb91d0504cf671d1dae0f8e26e6907fd5042f92b5a036a32478191956fd8cf8d6a33acefd709266ed10681", 0xaa, 0x7}, {&(0x7f0000001980)="5c8086a64f42cb8eb43d21ba68ebedfe642a7e86465c4db21568b6f923b930b131ab605e9b4586db64d8c73f67e62678211fb59aafbcb5e58c09b44cfbca7d06cbc954a5eee916401da80254d2ba87ee52d880851f34574a794ad42e260a45e46ff1ed1f4dfdf47fab050a092bfa4d56395c8c4ffcbf2f9465b5552e05f564bee600468236400ffc64107a6dbb910fa9ed0735418d96c69758e863d48f04070e9ff71d613cf02069e81262aae4994e1a7bf5b7f0782023d72ac7962a2553b50453e5a4a63cfc1ce9f4e94c75e50e652d21794ab158", 0xd5}, {&(0x7f0000001a80)="2348f852e1db7408a36252d1ee1c02ea009fac529e3c1be710a7a397f008806398774a1ea0bd368f9de430dc7fa92a0fccc6c0029cb7e2c9e2291f2e43a21ac7102cb42962bfca87c8c8c22d512a9cfe920a20def56639bada213a58e18ceb4bac2e5c01e80589139bd65f235de9a5fb0a90672941306dae32df046c98f7b4b49ab6d901debc6b82bfc894112ca6634e12b7d0969b785d642f06dfe40f329f61fa968f17790920f8e0414ae67a8911c4c64c9618f1d52bbd5b8b8c4fe5a93d418c34", 0xc2}, {&(0x7f0000001b80)="fd10a1cf39763cd3f528fd5ff6e06baa992702b4208a021fceff3b864e538de7043901e5fb315431ffe71c653ef7e30ffb424c8c313d1a6bd94f525d0795aa4e45ec393364486885340a1d658e439d955847d9b3c9df8805a92ff1fb78d8e9434a7b97604537ca3d6db2d6a9b03539f43acac850cce275eb64dcd484e88277ddebaf951fdbbe847aaeb53b58a2a9ba10bf94a3fbe24d190a4f69a4ec21a3ccee5065bbd9176109f1c00fb0816ddde1a80577107afb66c3a9c8d6bdf1fe6eb9aab9b21ca088b43d2b5c43b2df0c7ba979e39f860843680141fbd6f9a9b6e243bdd67206", 0xe3}]) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000400)=@req={0x7, 0xfffffffffffff800, 0x1c3, 0x137}, 0x10) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r2, 0xa2, "15a7b0", "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"}}, 0x110) 09:31:26 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000300000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1203.781433] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1203.827715] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1203.870319] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:26 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x105000, 0x0) 09:31:26 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000fffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1203.934950] loop5: p1 < > p4 [ 1203.949900] loop5: partition table partially beyond EOD, truncated 09:31:26 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000400300000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1203.977866] Dev loop3: unable to read RDB block 1 [ 1203.982997] loop3: unable to read partition table [ 1203.994013] loop5: p1 size 2 extends beyond EOD, truncated [ 1204.001083] loop3: partition table beyond EOD, truncated [ 1204.024158] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1204.038211] Dev loop4: unable to read RDB block 1 [ 1204.043212] loop4: unable to read partition table [ 1204.061327] loop4: partition table beyond EOD, truncated 09:31:26 executing program 2: syz_read_part_table(0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="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", 0xfb, 0x7fffffff}, {&(0x7f0000000140)="10169de98c18f0cc7fa4fe3e469c5c415301f98c8d62aaec8035dda9e9c5200431cbf5325dc6ebef0fe0b5ac22ab82eba452eab5b57646dd88a1f63deef1a1c6d7fbb74bfc0503297ef820f664ab3807ebdb5a9b1d6a7b8a97fd792dcaaaa926658d3de014d065de3e87733babd82e68e1d8e1372680b4d36b0c1ce7e1480af01deb5d5e22303995851633f22479fcdd500615436aed736f79fef95dcaeb3d97559b6410baafe867586016a168870a9d0b5aa09e07d92cc5b2323cae245b4b", 0xbf, 0x1}]) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00', 0x0, 0x1d}, 0xffffff3b) fchmod(r0, 0x40000002) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000540)="388ec26d8d0305c55d7ee3b6cba73eb41a6aff57c3697f8bc0f09da9ed4ce83e2d78cf64b7870db75d63073823057a87e3b2f8a5bc7f275c7964af7415c959d40140c3d1eea3cbc2fcecb7f58a33e2bc82b060b78d5985593f0b283527704ed723f796412db3f930dc957b936c8acbc60ac220d4fd33aed91f5600c177a2067395504bf189db0539d4d97192", 0x8c) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffff, 0x60003) syz_mount_image$nfs4(&(0x7f00000002c0)='nfs4\x00', &(0x7f0000000300)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="7b13415ed021f3164fb07c29f8bc0e81587decb43484cdfa5f1ef75b31175ebff7", 0x21, 0x400}], 0x810004, &(0x7f00000003c0)='/dev/admmidi#\x00') getsockname$unix(r2, &(0x7f00000004c0)=@abs, &(0x7f0000000440)=0x6e) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000680)="359f7c7eded90635a3ee23f4f6d919c04d9e161391d392103742dc9c95511c84920a2a4e36a3b6e5686ae59fb20a23eea07e504c03e3eef50f63b0f56e4deadd22b5f8fd86ac738395e51694882ed8366aa59b079c1e58bc389143ef5bab0c2eb34055cb79a98cf92f2b357c7784383a736c061384d1b38ce45445b93973365f427634b6600600214028ea5f45b4892ad0ff8595c8a0a72e02e6afc893435c8510336d13cc92f1ec69f95fef099481d4cffdaa945a6546a62dee50248dfc7b2e16b2ac8c0f96097f3452fc969b6aa01a730c84e587eb709ddda6f0c9221db0f35d812c155e39807aa42799f4b1302cab4f49945b1eb682601e68183e90ab882f") fallocate(r0, 0x10, 0x2, 0x6) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000480), &(0x7f0000000400)=0x4) [ 1204.077646] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1204.080743] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1204.100057] loop1: p1 < > p4 [ 1204.103405] loop1: partition table partially beyond EOD, truncated [ 1204.132811] loop1: p1 size 2 extends beyond EOD, truncated [ 1204.139681] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1204.155334] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1204.167921] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1204.234036] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1204.281405] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:26 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000800400000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:26 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000001000008a6e94c0000055f5eda8e227feabebf069408450e24456fc8ceaadebffc108d4aad6775da1c6de7796f91787a3bc899076bb9848c06d1ad8e456423bd3c0282f9f98a7f49e9b6579904c916a82b7d75f81c7660a03f7aa348c570cc0c8c371b2beda431e97f72de0e91a7b080000008c01a9dff781c1a31ad4cf3a66ad7c22fbe0ea486d87f811214903f33f44ae", 0xe6}]) 09:31:26 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000006c0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1204.338846] Dev loop4: unable to read RDB block 1 [ 1204.347114] loop4: unable to read partition table 09:31:26 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x3a402, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x2, 0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) [ 1204.400570] loop4: partition table beyond EOD, truncated [ 1204.406073] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1204.483330] Dev loop3: unable to read RDB block 1 [ 1204.499163] loop3: unable to read partition table 09:31:26 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000c00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:26 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800f0ffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:26 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000500000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:26 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x59}]) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40102, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x9, 0x3, 0x0, 0x0, @irqchip={0x101, 0x3}}, {0x5, 0x3, 0x0, 0x0, @sint={0x3, 0x2}}, {0x80, 0x9, 0x0, 0x0, @msi={0x7fff, 0x101, 0xb399}}, {0x7, 0x4, 0x0, 0x0, @adapter={0x8a, 0xde0, 0xffff, 0x80, 0x7}}]}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) [ 1204.523769] loop3: partition table beyond EOD, truncated [ 1204.558711] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:27 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000600000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1204.587066] net_ratelimit: 23 callbacks suppressed [ 1204.587079] protocol 88fb is buggy, dev hsr_slave_0 [ 1204.597247] protocol 88fb is buggy, dev hsr_slave_1 [ 1204.621529] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:27 executing program 2: syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) [ 1204.698568] loop5: p1 < > p4 [ 1204.707375] loop5: partition table partially beyond EOD, truncated [ 1204.719763] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1204.739644] loop5: p1 size 2 extends beyond EOD, truncated 09:31:27 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000011c00000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1204.791028] loop1: p1 < > p4 [ 1204.794549] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1204.806045] loop1: partition table partially beyond EOD, truncated [ 1204.817751] Dev loop4: unable to read RDB block 1 [ 1204.825006] loop4: unable to read partition table [ 1204.827022] protocol 88fb is buggy, dev hsr_slave_0 [ 1204.830131] protocol 88fb is buggy, dev hsr_slave_0 [ 1204.835085] protocol 88fb is buggy, dev hsr_slave_1 [ 1204.840113] protocol 88fb is buggy, dev hsr_slave_1 [ 1204.863999] loop1: p1 size 2 extends beyond EOD, truncated [ 1204.878817] loop4: partition table beyond EOD, truncated [ 1204.884507] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1204.912700] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1204.948182] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1204.990402] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:31:27 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000003f00000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:27 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xa080, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:27 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000740000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1205.067909] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1205.128722] Dev loop4: unable to read RDB block 1 [ 1205.143659] loop4: unable to read partition table [ 1205.161099] loop4: partition table beyond EOD, truncated 09:31:27 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fdfdffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1205.178621] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1205.198146] Dev loop3: unable to read RDB block 1 [ 1205.203230] loop3: unable to read partition table [ 1205.220777] loop3: partition table beyond EOD, truncated [ 1205.239940] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:27 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000001000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:27 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x100) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e20, @multicast1}], 0x30) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x8, [0x100000000, 0x3f, 0x0, 0x4, 0x4, 0x9, 0xde3, 0x100000000]}, &(0x7f00000000c0)=0x14) 09:31:27 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000034000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:27 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = dup(0xffffffffffffff9c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000340)={0x69, 0x7d, 0x2, {{0x0, 0x3d, 0x1, 0x100000000, {0x2, 0x3, 0x89d}, 0x100000, 0xff, 0x100, 0x6e7c, 0x7, 'GPLppp1', 0x0, '', 0x0, '', 0x3, 'em1'}, 0x17, '.procvboxnet1proc\'procC', r1, r2, r3}}, 0x69) [ 1205.367772] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1205.387126] protocol 88fb is buggy, dev hsr_slave_0 [ 1205.392321] protocol 88fb is buggy, dev hsr_slave_1 09:31:27 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000048000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1205.424113] loop1: p1 < > p4 [ 1205.428112] loop1: partition table partially beyond EOD, truncated [ 1205.444005] loop1: p1 size 2 extends beyond EOD, truncated 09:31:27 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000007a0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:27 executing program 2: syz_read_part_table(0x200000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x402002) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) [ 1205.476901] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1205.497203] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1205.590333] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1205.609283] loop5: p1 < > p4 [ 1205.612664] loop5: partition table partially beyond EOD, truncated [ 1205.633969] loop5: p1 size 2 extends beyond EOD, truncated [ 1205.653633] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1205.662712] Dev loop4: unable to read RDB block 1 [ 1205.670253] loop4: unable to read partition table [ 1205.682160] loop4: partition table beyond EOD, truncated [ 1205.688864] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1205.724572] Dev loop3: unable to read RDB block 1 [ 1205.732365] loop3: unable to read partition table [ 1205.751802] loop3: partition table beyond EOD, truncated [ 1205.761641] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:28 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:28 executing program 2: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000e6ff000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000040)={0x0, 0x7, @value=0x80000001}) 09:31:28 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000687fffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1205.785386] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1205.792899] protocol 88fb is buggy, dev hsr_slave_0 [ 1205.792953] protocol 88fb is buggy, dev hsr_slave_1 [ 1205.804962] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1205.866283] Dev loop4: unable to read RDB block 1 [ 1205.875021] loop4: unable to read partition table [ 1205.886749] loop4: partition table beyond EOD, truncated [ 1205.896625] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:28 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000010000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1205.918120] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:28 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000001200000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:28 executing program 2: syz_read_part_table(0x2, 0xaaaaaaaaaaaabab, &(0x7f0000000480)) [ 1206.057354] loop1: p1 < > p4 [ 1206.061974] loop1: partition table partially beyond EOD, truncated [ 1206.084601] loop1: p1 size 2 extends beyond EOD, truncated 09:31:28 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000020000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:28 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000f00000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1206.107458] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1206.117967] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1206.190016] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:28 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:28 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000030000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1206.254840] Dev loop4: unable to read RDB block 1 [ 1206.265048] loop4: unable to read partition table [ 1206.294652] loop4: partition table beyond EOD, truncated 09:31:28 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006881ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:28 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1206.301253] Dev loop3: unable to read RDB block 1 [ 1206.309167] loop3: unable to read partition table [ 1206.318708] loop3: partition table beyond EOD, truncated [ 1206.330300] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1206.342603] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:28 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000040000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:28 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1206.429686] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1206.477838] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:28 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000050000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:29 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000001400000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1206.572626] loop5: p1 < > p4 [ 1206.581209] loop1: p1 < > p4 [ 1206.589102] loop1: partition table partially beyond EOD, truncated [ 1206.597822] loop5: partition table partially beyond EOD, truncated [ 1206.617834] Dev loop3: unable to read RDB block 1 [ 1206.622879] loop3: unable to read partition table [ 1206.628118] loop1: p1 size 2 extends beyond EOD, truncated [ 1206.640722] loop5: p1 size 2 extends beyond EOD, truncated [ 1206.642934] loop3: partition table beyond EOD, truncated 09:31:29 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000060000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1206.678479] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1206.689661] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1206.708357] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:29 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000fe0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1206.739753] Dev loop4: unable to read RDB block 1 [ 1206.744900] loop4: unable to read partition table [ 1206.764569] loop4: partition table beyond EOD, truncated [ 1206.777275] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1206.852060] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1206.901801] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1206.937472] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1206.977673] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:29 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000080000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:29 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006882ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1207.042156] Dev loop4: unable to read RDB block 1 [ 1207.049459] loop4: unable to read partition table [ 1207.064078] loop4: partition table beyond EOD, truncated [ 1207.089525] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1207.102039] Dev loop3: unable to read RDB block 1 [ 1207.112292] loop3: unable to read partition table [ 1207.123455] loop3: partition table beyond EOD, truncated 09:31:29 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000100000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1207.139908] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:29 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000002800000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:29 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000011c0000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1207.254634] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1207.305132] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:29 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000003f0000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1207.349577] loop1: p1 < > p4 [ 1207.355188] loop1: partition table partially beyond EOD, truncated [ 1207.402725] loop1: p1 size 2 extends beyond EOD, truncated 09:31:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1207.448050] Dev loop3: unable to read RDB block 1 [ 1207.453046] loop3: unable to read partition table [ 1207.463493] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1207.481405] loop3: partition table beyond EOD, truncated [ 1207.507093] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1207.520371] Dev loop4: unable to read RDB block 1 [ 1207.525270] loop4: unable to read partition table [ 1207.545691] loop4: partition table beyond EOD, truncated [ 1207.562209] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1207.565325] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:30 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000e20100000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:30 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000003400000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:30 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000688cffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:30 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b0000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1207.657793] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1207.748700] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:30 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000004800000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1207.817995] Dev loop4: unable to read RDB block 1 [ 1207.826558] loop4: unable to read partition table [ 1207.855997] loop4: partition table beyond EOD, truncated [ 1207.865322] loop5: p1 < > p4 [ 1207.875679] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1207.888428] loop5: partition table partially beyond EOD, truncated [ 1207.899066] loop1: p1 < > p4 [ 1207.902323] loop1: partition table partially beyond EOD, truncated [ 1207.925096] loop1: p1 size 2 extends beyond EOD, truncated [ 1207.936546] loop5: p1 size 2 extends beyond EOD, truncated [ 1207.958987] Dev loop3: unable to read RDB block 1 [ 1207.964101] loop3: unable to read partition table 09:31:30 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000004800000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:30 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000fffffff60000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1207.969863] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1207.976705] loop3: partition table beyond EOD, truncated [ 1207.982739] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1207.999505] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:30 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006897ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1208.047722] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1208.087838] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1208.144746] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1208.177758] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1208.247617] Dev loop3: unable to read RDB block 1 [ 1208.252689] loop3: unable to read partition table [ 1208.267865] loop3: partition table beyond EOD, truncated [ 1208.277016] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1208.330400] loop1: p1 < > p4 [ 1208.337571] loop1: partition table partially beyond EOD, truncated [ 1208.357885] Dev loop4: unable to read RDB block 1 [ 1208.364108] loop4: unable to read partition table [ 1208.371392] loop1: p1 size 2 extends beyond EOD, truncated 09:31:30 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000fffffdfc0000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1208.383325] loop4: partition table beyond EOD, truncated [ 1208.407483] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1208.419294] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:30 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000300000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1208.472223] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:30 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000fffffffe0000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1208.568878] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1208.611225] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:31 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000004c00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1208.705237] loop5: p1 < > p4 [ 1208.720073] loop5: partition table partially beyond EOD, truncated 09:31:31 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068a5ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:31 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000fcfdffff0000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1208.746012] loop5: p1 size 2 extends beyond EOD, truncated [ 1208.779080] Dev loop3: unable to read RDB block 1 [ 1208.786035] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1208.801806] loop3: unable to read partition table 09:31:31 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff0000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1208.827180] loop3: partition table beyond EOD, truncated [ 1208.832810] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1208.857979] Dev loop4: unable to read RDB block 1 [ 1208.871898] loop4: unable to read partition table [ 1208.897072] loop4: partition table beyond EOD, truncated [ 1208.911787] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1208.929065] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1208.969268] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1209.031184] loop1: p1 < > p4 [ 1209.042777] loop1: partition table partially beyond EOD, truncated [ 1209.060014] loop1: p1 size 2 extends beyond EOD, truncated 09:31:31 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1209.077982] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1209.094152] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1209.160459] Dev loop3: unable to read RDB block 1 [ 1209.165391] loop3: unable to read partition table [ 1209.192471] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1209.197097] loop3: partition table beyond EOD, truncated [ 1209.205707] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1209.229584] Dev loop4: unable to read RDB block 1 [ 1209.242832] loop4: unable to read partition table [ 1209.252523] loop4: partition table beyond EOD, truncated [ 1209.265132] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:31 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000200000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:31 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000800400000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:31 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068a6ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:31 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000006000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:31 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000300000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:31 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffff82, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1209.427658] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1209.519989] loop5: p1 < > p4 [ 1209.525738] loop5: partition table partially beyond EOD, truncated [ 1209.533619] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1209.551885] loop5: p1 size 2 extends beyond EOD, truncated 09:31:32 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000400000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1209.595904] loop1: p1 < > p4 [ 1209.603358] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1209.605302] loop1: partition table partially beyond EOD, truncated [ 1209.628058] Dev loop3: unable to read RDB block 1 [ 1209.640271] loop1: p1 size 2 extends beyond EOD, truncated [ 1209.647528] loop3: unable to read partition table [ 1209.659147] loop3: partition table beyond EOD, truncated [ 1209.678482] Dev loop4: unable to read RDB block 1 [ 1209.683511] loop4: unable to read partition table [ 1209.691424] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:32 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffff82, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:32 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000500000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1209.700439] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1209.710494] loop4: partition table beyond EOD, truncated [ 1209.730246] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1209.740867] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:32 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffff82, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1209.804582] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:32 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000600000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1209.858394] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:32 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffff81, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1209.921661] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1209.947027] net_ratelimit: 25 callbacks suppressed [ 1209.947035] protocol 88fb is buggy, dev hsr_slave_0 [ 1209.947064] protocol 88fb is buggy, dev hsr_slave_0 [ 1209.952032] protocol 88fb is buggy, dev hsr_slave_1 [ 1209.967177] protocol 88fb is buggy, dev hsr_slave_1 [ 1210.020494] Dev loop3: unable to read RDB block 1 [ 1210.027055] protocol 88fb is buggy, dev hsr_slave_0 [ 1210.029875] loop3: unable to read partition table [ 1210.032137] protocol 88fb is buggy, dev hsr_slave_1 [ 1210.060656] loop3: partition table beyond EOD, truncated [ 1210.082831] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1210.091377] Dev loop4: unable to read RDB block 1 [ 1210.096561] loop4: unable to read partition table [ 1210.102132] loop4: partition table beyond EOD, truncated [ 1210.110088] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:32 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000500000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:32 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068a9ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:32 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000006800000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:32 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffff81, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:32 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000800000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1210.297908] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:32 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xffffff81, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:32 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000001000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1210.342002] loop5: p1 < > p4 [ 1210.350325] loop5: partition table partially beyond EOD, truncated [ 1210.370324] loop5: p1 size 2 extends beyond EOD, truncated [ 1210.377614] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1210.405958] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1210.421204] loop1: p1 < > p4 [ 1210.424432] loop1: partition table partially beyond EOD, truncated 09:31:32 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR, @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:32 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000001c01000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1210.448094] loop1: p1 size 2 extends beyond EOD, truncated [ 1210.485767] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1210.518040] Dev loop4: unable to read RDB block 1 [ 1210.524298] loop4: unable to read partition table [ 1210.538902] loop4: partition table beyond EOD, truncated [ 1210.552687] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1210.564481] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1210.608756] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1210.661938] Dev loop3: unable to read RDB block 1 [ 1210.677807] loop3: unable to read partition table [ 1210.688740] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR, @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:33 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000003000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1210.717383] loop3: partition table beyond EOD, truncated [ 1210.747803] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1210.757668] Dev loop4: unable to read RDB block 1 [ 1210.772912] loop4: unable to read partition table [ 1210.795174] loop4: partition table beyond EOD, truncated [ 1210.823785] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1210.827095] protocol 88fb is buggy, dev hsr_slave_0 [ 1210.836176] protocol 88fb is buggy, dev hsr_slave_1 [ 1210.842559] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1210.987798] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1211.043970] loop5: p1 < > p4 [ 1211.051297] loop5: partition table partially beyond EOD, truncated [ 1211.067035] protocol 88fb is buggy, dev hsr_slave_0 [ 1211.067065] protocol 88fb is buggy, dev hsr_slave_1 09:31:33 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000600000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:33 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068bfffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:33 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000004003000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR, @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:33 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000006c00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1211.094571] loop5: p1 size 2 extends beyond EOD, truncated [ 1211.152739] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:33 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000008004000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1211.228068] Dev loop4: unable to read RDB block 1 [ 1211.234230] loop4: unable to read partition table [ 1211.249417] loop4: partition table beyond EOD, truncated [ 1211.270455] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR, @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:33 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000005000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1211.278133] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1211.319717] loop1: p1 < > p4 [ 1211.330367] loop1: partition table partially beyond EOD, truncated [ 1211.344604] loop1: p1 size 2 extends beyond EOD, truncated [ 1211.357902] Dev loop3: unable to read RDB block 1 [ 1211.362984] loop3: unable to read partition table 09:31:33 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000006000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1211.385388] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1211.394801] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1211.404610] loop3: partition table beyond EOD, truncated [ 1211.415749] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:33 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000011c000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1211.478202] Dev loop4: unable to read RDB block 1 [ 1211.483355] loop4: unable to read partition table [ 1211.503205] loop4: partition table beyond EOD, truncated [ 1211.510087] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR, @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1211.527224] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1211.547912] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1211.726091] loop5: p1 < > p4 [ 1211.730554] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1211.741633] loop5: partition table partially beyond EOD, truncated [ 1211.754664] loop5: p1 size 2 extends beyond EOD, truncated 09:31:34 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000260600000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:34 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068c9ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:34 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000003f000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000007400000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR, @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1211.785561] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:34 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000340000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1211.878604] Dev loop4: unable to read RDB block 1 [ 1211.886102] loop4: unable to read partition table [ 1211.910143] loop4: partition table beyond EOD, truncated [ 1211.921928] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:34 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000480000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:34 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfbffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1211.937247] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:34 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:34 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b0000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1212.036257] loop1: p1 < > p4 [ 1212.049008] loop1: partition table partially beyond EOD, truncated [ 1212.051515] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1212.065332] loop1: p1 size 2 extends beyond EOD, truncated [ 1212.077939] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:34 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfbffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1212.095543] Dev loop3: unable to read RDB block 1 [ 1212.100833] loop3: unable to read partition table [ 1212.119624] loop3: partition table beyond EOD, truncated [ 1212.136734] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:34 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000100008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1212.255859] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1212.298743] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1212.404371] loop5: p1 < > p4 [ 1212.430691] loop5: partition table partially beyond EOD, truncated [ 1212.450747] loop5: p1 size 2 extends beyond EOD, truncated [ 1212.467695] Dev loop3: unable to read RDB block 1 [ 1212.472600] loop3: unable to read partition table [ 1212.500870] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1212.513300] loop3: partition table beyond EOD, truncated [ 1212.531886] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1212.601580] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000700000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:35 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfbffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:35 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000007a00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:35 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068e4ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:35 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000200008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:35 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000300008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:35 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe4ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1212.808137] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1212.873666] Dev loop4: unable to read RDB block 1 [ 1212.885701] loop4: unable to read partition table [ 1212.897102] loop4: partition table beyond EOD, truncated [ 1212.909722] loop1: p1 < > p4 [ 1212.911019] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:35 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe4ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1212.913041] loop1: partition table partially beyond EOD, truncated 09:31:35 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000400008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1212.952965] loop1: p1 size 2 extends beyond EOD, truncated [ 1212.972847] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1212.980017] Dev loop3: unable to read RDB block 1 [ 1212.985112] loop3: unable to read partition table [ 1212.996107] loop3: partition table beyond EOD, truncated 09:31:35 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe4ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1213.005826] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1213.028022] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:35 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000500008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1213.068518] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1213.170912] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1213.231063] Dev loop4: unable to read RDB block 1 [ 1213.243912] loop4: unable to read partition table [ 1213.260949] loop4: partition table beyond EOD, truncated [ 1213.271910] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000900000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:35 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe2010000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1213.323081] loop5: p1 < > p4 [ 1213.339775] loop5: partition table partially beyond EOD, truncated 09:31:35 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000f000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:35 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000600008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:35 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068eeffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1213.363557] loop5: p1 size 2 extends beyond EOD, truncated [ 1213.427795] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1213.444997] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1213.514818] Dev loop3: unable to read RDB block 1 [ 1213.519998] loop3: unable to read partition table [ 1213.534040] loop3: partition table beyond EOD, truncated [ 1213.540131] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1213.584576] loop1: p1 < > p4 [ 1213.593896] loop1: partition table partially beyond EOD, truncated [ 1213.615887] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1213.625077] loop1: p1 size 2 extends beyond EOD, truncated [ 1213.659548] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1213.668161] Dev loop4: unable to read RDB block 1 [ 1213.673194] loop4: unable to read partition table [ 1213.692589] loop4: partition table beyond EOD, truncated 09:31:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:36 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe2010000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:36 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000800008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1213.710219] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1213.718264] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:36 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe2010000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:36 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000001000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1213.771352] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1213.808019] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:36 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068f4ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1213.867967] Dev loop3: unable to read RDB block 1 [ 1213.874608] loop3: unable to read partition table [ 1213.900014] loop3: partition table beyond EOD, truncated [ 1213.910828] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYPTR=&(0x7f0000000440)=ANY=[], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1213.928192] Dev loop4: unable to read RDB block 1 [ 1213.934571] loop4: unable to read partition table [ 1213.951748] loop4: partition table beyond EOD, truncated [ 1213.977411] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:36 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000c00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:36 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000011c00008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1214.074512] loop5: p1 < > p4 [ 1214.086068] loop5: partition table partially beyond EOD, truncated 09:31:36 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000e201000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYPTR=&(0x7f0000000440)=ANY=[], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:36 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000003f00008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1214.121432] loop5: p1 size 2 extends beyond EOD, truncated [ 1214.165402] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1214.176785] loop1: p1 < > p4 [ 1214.190868] loop1: partition table partially beyond EOD, truncated [ 1214.198439] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1214.223947] loop1: p1 size 2 extends beyond EOD, truncated [ 1214.238352] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:36 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000034000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1214.270394] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1214.303130] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1214.348085] Dev loop3: unable to read RDB block 1 [ 1214.360961] loop3: unable to read partition table [ 1214.387256] loop3: partition table beyond EOD, truncated 09:31:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYPTR=&(0x7f0000000440)=ANY=[], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:36 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b00008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1214.396369] Dev loop4: unable to read RDB block 1 [ 1214.407419] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1214.417625] loop4: unable to read partition table [ 1214.439513] loop4: partition table beyond EOD, truncated [ 1214.451568] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1214.461720] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:36 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000048000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1214.517946] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:37 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068f5ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:37 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068f4ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1214.588436] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:37 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000001a0f00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:37 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1214.685305] loop5: p1 < > p4 [ 1214.701294] loop5: partition table partially beyond EOD, truncated [ 1214.718333] Dev loop4: unable to read RDB block 1 [ 1214.727137] loop4: unable to read partition table [ 1214.734041] loop5: p1 size 2 extends beyond EOD, truncated [ 1214.745321] loop4: partition table beyond EOD, truncated [ 1214.760130] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1214.773164] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1214.798174] loop1: p1 < > p4 [ 1214.809009] loop1: partition table partially beyond EOD, truncated [ 1214.838373] loop1: p1 size 2 extends beyond EOD, truncated [ 1214.838495] Dev loop3: unable to read RDB block 1 [ 1214.855958] loop3: unable to read partition table [ 1214.871119] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1214.878467] loop3: partition table beyond EOD, truncated [ 1214.892064] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1214.904673] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:37 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000003000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:37 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068f4ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:37 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfc00008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1214.947790] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1214.987052] net_ratelimit: 23 callbacks suppressed [ 1214.987060] protocol 88fb is buggy, dev hsr_slave_0 [ 1214.997188] protocol 88fb is buggy, dev hsr_slave_1 [ 1215.011004] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:37 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000fffffffe00008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:37 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068f4ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:37 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068f6ffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1215.048008] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1215.114168] Dev loop3: unable to read RDB block 1 [ 1215.119362] loop3: unable to read partition table [ 1215.150024] loop3: partition table beyond EOD, truncated [ 1215.168920] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:37 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000fcfdffff00008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1215.212485] Dev loop4: unable to read RDB block 1 [ 1215.222793] loop4: unable to read partition table [ 1215.227910] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.227961] protocol 88fb is buggy, dev hsr_slave_1 [ 1215.237033] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.243225] protocol 88fb is buggy, dev hsr_slave_1 09:31:37 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000001200000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1215.294113] loop4: partition table beyond EOD, truncated [ 1215.304525] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1215.331099] loop1: p1 < > p4 09:31:37 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1215.339279] loop1: partition table partially beyond EOD, truncated [ 1215.357183] loop1: p1 size 2 extends beyond EOD, truncated [ 1215.382434] loop5: p1 < > p4 09:31:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1215.397356] loop5: partition table partially beyond EOD, truncated [ 1215.405097] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1215.412504] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1215.436210] loop5: p1 size 2 extends beyond EOD, truncated [ 1215.443711] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1215.488491] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1215.510795] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:38 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000008004000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:38 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1215.549626] Dev loop3: unable to read RDB block 1 [ 1215.555455] loop3: unable to read partition table 09:31:38 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fbffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1215.589898] loop3: partition table beyond EOD, truncated [ 1215.601666] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1215.615454] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1215.694743] Dev loop4: unable to read RDB block 1 [ 1215.704228] loop4: unable to read partition table [ 1215.727378] loop4: partition table beyond EOD, truncated [ 1215.733292] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1215.741424] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:38 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:38 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000002000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1215.787047] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.792200] protocol 88fb is buggy, dev hsr_slave_1 [ 1215.841238] loop1: p1 < > p4 [ 1215.844486] loop1: partition table partially beyond EOD, truncated [ 1215.853135] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1215.877444] loop1: p1 size 2 extends beyond EOD, truncated 09:31:38 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000003000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1215.886758] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:38 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xb05a0100, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1215.921263] Dev loop3: unable to read RDB block 1 [ 1215.926833] loop3: unable to read partition table [ 1215.936179] loop3: partition table beyond EOD, truncated [ 1215.947239] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1215.958582] Dev loop4: unable to read RDB block 1 [ 1215.964122] loop4: unable to read partition table [ 1215.986679] loop4: partition table beyond EOD, truncated [ 1215.997389] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1216.005512] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:38 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xb05a0100, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:38 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000001400000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:38 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000004000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:38 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fdffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:38 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000005000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:38 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xb05a0100, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:38 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000005000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1216.187026] protocol 88fb is buggy, dev hsr_slave_0 [ 1216.187046] protocol 88fb is buggy, dev hsr_slave_0 [ 1216.217674] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1216.258684] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:38 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa9ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:38 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000006000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:38 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000008000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1216.401589] Dev loop3: unable to read RDB block 1 [ 1216.406661] loop3: unable to read partition table [ 1216.428919] loop3: partition table beyond EOD, truncated [ 1216.439336] Dev loop4: unable to read RDB block 1 [ 1216.444493] loop4: unable to read partition table 09:31:38 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000010000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:38 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa9ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1216.449887] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1216.456886] loop4: partition table beyond EOD, truncated [ 1216.468376] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1216.502985] loop5: p1 < > p4 [ 1216.514622] loop5: partition table partially beyond EOD, truncated [ 1216.525151] loop1: p1 < > p4 [ 1216.529026] loop1: partition table partially beyond EOD, truncated [ 1216.542557] loop1: p1 size 2 extends beyond EOD, truncated [ 1216.554983] loop5: p1 size 2 extends beyond EOD, truncated [ 1216.563498] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1216.571557] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1216.598592] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1216.620988] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1216.658020] Dev loop3: unable to read RDB block 1 [ 1216.662930] loop3: unable to read partition table [ 1216.677041] loop3: partition table beyond EOD, truncated [ 1216.682530] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1216.700305] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1216.762031] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:39 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000f1a00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:39 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000001c010000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:39 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068feffffff0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:39 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa9ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:39 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000006000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1216.917946] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:39 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000030000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1217.008012] Dev loop4: unable to read RDB block 1 [ 1217.013109] loop4: unable to read partition table [ 1217.023636] loop4: partition table beyond EOD, truncated [ 1217.030183] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:39 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000040030000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1217.079520] loop1: p1 < > p4 [ 1217.084190] loop1: partition table partially beyond EOD, truncated [ 1217.105446] loop1: p1 size 2 extends beyond EOD, truncated [ 1217.118113] Dev loop3: unable to read RDB block 1 [ 1217.123340] loop3: unable to read partition table 09:31:39 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000080040000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1217.134995] loop3: partition table beyond EOD, truncated [ 1217.149646] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:39 executing program 2: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b147006b6b6bd59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1217.191127] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1217.198876] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:39 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000050000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1217.258245] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1217.320809] loop5: p1 < > p4 [ 1217.324223] loop5: partition table partially beyond EOD, truncated [ 1217.350397] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1217.375768] loop5: p1 size 2 extends beyond EOD, truncated [ 1217.396011] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1217.413019] Dev loop3: unable to read RDB block 1 [ 1217.418458] loop3: unable to read partition table [ 1217.427980] loop3: partition table beyond EOD, truncated [ 1217.433638] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1217.461088] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:39 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000007000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:39 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000060000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:39 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000800000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:39 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000001f00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:40 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000011c0000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1217.624315] Dev loop4: unable to read RDB block 1 [ 1217.639959] loop4: unable to read partition table [ 1217.659925] loop4: partition table beyond EOD, truncated [ 1217.667761] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1217.705485] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:40 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000003f0000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1217.753175] loop1: p1 < > p4 [ 1217.761331] loop1: partition table partially beyond EOD, truncated [ 1217.781604] loop1: p1 size 2 extends beyond EOD, truncated [ 1217.816651] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1217.828947] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1217.911068] loop5: p1 < > p4 [ 1217.926248] loop5: partition table partially beyond EOD, truncated [ 1217.934151] Dev loop3: unable to read RDB block 1 [ 1217.939357] loop3: unable to read partition table [ 1217.951557] loop3: partition table beyond EOD, truncated [ 1217.962126] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1217.975455] loop5: p1 size 2 extends beyond EOD, truncated [ 1217.985390] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:40 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000003400000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:40 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000001000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.007967] Dev loop4: unable to read RDB block 1 [ 1218.013005] loop4: unable to read partition table [ 1218.044599] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1218.046692] loop4: partition table beyond EOD, truncated [ 1218.073280] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1218.097754] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:40 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000c000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:40 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa25a0100, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:40 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000004800000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.181062] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:40 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa25a0100, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.257648] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1218.353220] loop1: p1 < > p4 [ 1218.384954] loop1: partition table partially beyond EOD, truncated 09:31:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:40 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000002000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1218.428668] Dev loop4: unable to read RDB block 1 09:31:40 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xa25a0100, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.467534] loop1: p1 size 2 extends beyond EOD, truncated [ 1218.468174] loop4: unable to read partition table [ 1218.493583] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1218.501298] Dev loop3: unable to read RDB block 1 09:31:40 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b00008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.517693] loop3: unable to read partition table [ 1218.520684] loop4: partition table beyond EOD, truncated [ 1218.541353] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1218.553717] loop3: partition table beyond EOD, truncated [ 1218.580023] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1218.640855] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:41 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000001008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:41 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x96030000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.687585] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1218.733651] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:41 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068ffffffff8760000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:41 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000002008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.808125] loop5: p1 < > p4 [ 1218.823940] loop5: partition table partially beyond EOD, truncated 09:31:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000260d000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:41 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x96030000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.857763] loop5: p1 size 2 extends beyond EOD, truncated [ 1218.881118] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000002300000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:41 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000003008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1218.969137] loop1: p1 < > p4 [ 1218.972471] loop1: partition table partially beyond EOD, truncated [ 1218.992567] loop1: p1 size 2 extends beyond EOD, truncated [ 1219.015378] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1219.055238] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:41 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000004008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:41 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x96030000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1219.130810] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1219.191964] Dev loop4: unable to read RDB block 1 [ 1219.197920] loop4: unable to read partition table [ 1219.221932] loop4: partition table beyond EOD, truncated 09:31:41 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000010000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:41 executing program 2: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000003008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:41 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000005008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1219.240741] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1219.252439] Dev loop3: unable to read RDB block 1 [ 1219.266195] loop3: unable to read partition table [ 1219.285331] loop3: partition table beyond EOD, truncated [ 1219.315616] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1219.348095] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1219.398691] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:41 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x82ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:41 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000006008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000001a0f000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000062600000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1219.529560] loop1: p1 < > p4 [ 1219.533010] loop1: partition table partially beyond EOD, truncated [ 1219.573192] loop5: p1 < > p4 [ 1219.576544] loop5: partition table partially beyond EOD, truncated [ 1219.591795] loop1: p1 size 2 extends beyond EOD, truncated 09:31:42 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x82ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:42 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000008008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1219.614656] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1219.629423] loop5: p1 size 2 extends beyond EOD, truncated [ 1219.677630] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1219.688012] Dev loop3: unable to read RDB block 1 [ 1219.697745] loop3: unable to read partition table [ 1219.734589] loop3: partition table beyond EOD, truncated [ 1219.751950] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1219.757355] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1219.787655] Dev loop4: unable to read RDB block 1 [ 1219.795068] loop4: unable to read partition table [ 1219.812651] loop4: partition table beyond EOD, truncated [ 1219.830323] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1219.832118] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1219.868463] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:42 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x82ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:42 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000010008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:42 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000020000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1219.937404] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:42 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000011c008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:42 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000012000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:42 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x80040000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1220.054593] Dev loop3: unable to read RDB block 1 [ 1220.070928] loop3: unable to read partition table 09:31:42 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000003f008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1220.096605] loop3: partition table beyond EOD, truncated [ 1220.125482] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:42 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x80040000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1220.191178] loop1: p1 < > p4 [ 1220.205005] loop1: partition table partially beyond EOD, truncated [ 1220.247982] loop1: p1 size 2 extends beyond EOD, truncated 09:31:42 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000002800000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1220.288374] loop5: p1 < > p4 [ 1220.297625] loop5: partition table partially beyond EOD, truncated [ 1220.317208] loop5: p1 size 2 extends beyond EOD, truncated [ 1220.324396] Dev loop4: unable to read RDB block 1 [ 1220.326109] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:42 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000340008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1220.332717] loop4: unable to read partition table [ 1220.342060] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1220.348577] net_ratelimit: 25 callbacks suppressed [ 1220.348585] protocol 88fb is buggy, dev hsr_slave_0 [ 1220.348634] protocol 88fb is buggy, dev hsr_slave_1 [ 1220.357727] protocol 88fb is buggy, dev hsr_slave_0 [ 1220.369317] protocol 88fb is buggy, dev hsr_slave_1 09:31:42 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x80040000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1220.400507] loop4: partition table beyond EOD, truncated [ 1220.404457] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1220.427019] protocol 88fb is buggy, dev hsr_slave_0 [ 1220.432149] protocol 88fb is buggy, dev hsr_slave_1 [ 1220.447701] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1220.459920] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1220.508565] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1220.547751] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:43 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:43 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x68000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1220.594809] Dev loop3: unable to read RDB block 1 [ 1220.606704] loop3: unable to read partition table [ 1220.625841] loop3: partition table beyond EOD, truncated 09:31:43 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000040000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1220.653396] Dev loop4: unable to read RDB block 1 [ 1220.657081] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1220.662249] loop4: unable to read partition table [ 1220.686471] loop4: partition table beyond EOD, truncated [ 1220.705974] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:43 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x68000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1220.748465] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:43 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000014000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:43 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000480008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:43 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x68000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1220.811260] loop1: p1 < > p4 [ 1220.818516] loop1: partition table partially beyond EOD, truncated [ 1220.840515] loop1: p1 size 2 extends beyond EOD, truncated 09:31:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1220.901990] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1220.968124] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:43 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000003f00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:43 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff6008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:43 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x60000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1221.008959] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:43 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfc008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:43 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068ffffffffffff070000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1221.148666] Dev loop4: unable to read RDB block 1 [ 1221.153784] loop4: unable to read partition table [ 1221.183589] loop4: partition table beyond EOD, truncated 09:31:43 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x60000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1221.208692] loop5: p1 < > p4 [ 1221.222499] loop5: partition table partially beyond EOD, truncated [ 1221.229017] protocol 88fb is buggy, dev hsr_slave_0 [ 1221.229066] protocol 88fb is buggy, dev hsr_slave_1 [ 1221.236037] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1221.254430] Dev loop3: unable to read RDB block 1 [ 1221.263887] loop5: p1 size 2 extends beyond EOD, truncated [ 1221.276308] loop3: unable to read partition table [ 1221.289145] loop3: partition table beyond EOD, truncated [ 1221.299130] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:43 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffe008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1221.321522] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1221.333131] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:43 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x60000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1221.408049] loop1: p1 < > p4 [ 1221.417977] loop1: partition table partially beyond EOD, truncated [ 1221.438000] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:43 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000f1a000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1221.457980] loop1: p1 size 2 extends beyond EOD, truncated [ 1221.467014] protocol 88fb is buggy, dev hsr_slave_0 [ 1221.467310] protocol 88fb is buggy, dev hsr_slave_0 [ 1221.492131] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:44 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000fcfdffff008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1221.537371] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1221.549814] Dev loop3: unable to read RDB block 1 [ 1221.561720] loop3: unable to read partition table 09:31:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1221.587476] loop3: partition table beyond EOD, truncated [ 1221.613043] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1221.617860] Dev loop4: unable to read RDB block 1 [ 1221.625241] loop4: unable to read partition table [ 1221.656564] loop4: partition table beyond EOD, truncated [ 1221.665768] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:44 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000004000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1221.697810] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:44 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000200000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:44 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1221.818152] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1221.857994] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:44 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1221.959317] loop5: p1 < > p4 [ 1221.975622] loop5: partition table partially beyond EOD, truncated [ 1221.998355] Dev loop3: unable to read RDB block 1 [ 1222.003266] loop3: unable to read partition table [ 1222.025018] loop5: p1 size 2 extends beyond EOD, truncated [ 1222.028516] loop3: partition table beyond EOD, truncated 09:31:44 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000001f000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1222.067081] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1222.084509] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:44 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000020000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1222.119101] loop1: p1 < > p4 [ 1222.134436] loop1: partition table partially beyond EOD, truncated [ 1222.148206] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1222.182518] loop1: p1 size 2 extends beyond EOD, truncated [ 1222.199941] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1222.231208] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:44 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000030000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1222.277942] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:44 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000524500000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:44 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000006b6b6b0000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1222.368032] Dev loop4: unable to read RDB block 1 [ 1222.376136] loop4: unable to read partition table [ 1222.393283] loop4: partition table beyond EOD, truncated [ 1222.424233] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:44 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000040000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1222.517686] Dev loop3: unable to read RDB block 1 [ 1222.527078] loop3: unable to read partition table [ 1222.539615] loop3: partition table beyond EOD, truncated [ 1222.556641] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1222.582755] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:45 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000050000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1222.648140] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1222.690302] loop1: p1 < > p4 [ 1222.693470] loop1: partition table partially beyond EOD, truncated 09:31:45 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000020000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1222.756743] loop1: p1 size 2 extends beyond EOD, truncated [ 1222.784514] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:45 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000060000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1222.812679] Dev loop3: unable to read RDB block 1 [ 1222.818088] loop3: unable to read partition table [ 1222.837956] loop3: partition table beyond EOD, truncated [ 1222.858299] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1222.867925] Dev loop4: unable to read RDB block 1 [ 1222.895500] loop4: unable to read partition table [ 1222.917683] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1222.933253] loop4: partition table beyond EOD, truncated 09:31:45 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000080000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1222.967459] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:45 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000004800000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:45 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000100000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:45 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068fffffffffffff00000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1223.110657] loop5: p1 < > p4 [ 1223.139135] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1223.149293] loop5: partition table partially beyond EOD, truncated [ 1223.178310] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1223.195949] loop5: p1 size 2 extends beyond EOD, truncated 09:31:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2]]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:45 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000001c0100008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1223.236353] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1223.243651] Dev loop4: unable to read RDB block 1 [ 1223.243686] loop4: unable to read partition table [ 1223.243751] loop4: partition table beyond EOD, truncated [ 1223.307946] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1223.319664] loop1: p1 < > p4 [ 1223.322911] loop1: partition table partially beyond EOD, truncated [ 1223.347555] loop1: p1 size 2 extends beyond EOD, truncated [ 1223.371165] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1223.398487] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:45 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000300008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1223.427949] Dev loop3: unable to read RDB block 1 [ 1223.432992] loop3: unable to read partition table [ 1223.466454] loop3: partition table beyond EOD, truncated 09:31:45 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000d26000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2]]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1223.496560] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(0xffffffffffffffff, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:46 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000400300008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1223.537308] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1223.577406] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1223.618786] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2]]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:46 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000100000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1223.728049] Dev loop4: unable to read RDB block 1 [ 1223.734103] loop4: unable to read partition table [ 1223.757777] loop4: partition table beyond EOD, truncated 09:31:46 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000004c00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:46 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000800400008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1223.785324] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(0xffffffffffffffff, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1223.857859] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2]]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:46 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000500008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1223.937112] loop1: p1 < > p4 [ 1223.943957] loop1: partition table partially beyond EOD, truncated [ 1223.969813] Dev loop3: unable to read RDB block 1 [ 1223.980171] loop1: p1 size 2 extends beyond EOD, truncated 09:31:46 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000028000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1223.991863] loop3: unable to read partition table [ 1224.020223] loop3: partition table beyond EOD, truncated [ 1224.031097] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1224.043993] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1224.092489] loop5: p1 < > p4 [ 1224.095638] loop5: partition table partially beyond EOD, truncated [ 1224.147895] loop5: p1 size 2 extends beyond EOD, truncated [ 1224.153932] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1224.174049] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1224.198455] Dev loop4: unable to read RDB block 1 [ 1224.203556] loop4: unable to read partition table 09:31:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2]]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:46 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000600008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1224.242725] loop4: partition table beyond EOD, truncated [ 1224.251593] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1224.276274] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1224.288013] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:46 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000200000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1224.349088] Dev loop3: unable to read RDB block 1 [ 1224.378548] loop3: unable to read partition table [ 1224.395684] loop3: partition table beyond EOD, truncated [ 1224.410738] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(0xffffffffffffffff, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1224.424477] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:46 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000011c00008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2]]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1224.508532] Dev loop4: unable to read RDB block 1 [ 1224.513613] loop4: unable to read partition table [ 1224.531928] loop4: partition table beyond EOD, truncated 09:31:46 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000455200000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1224.573746] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1224.604937] loop1: p1 < > p4 [ 1224.627615] loop1: partition table partially beyond EOD, truncated 09:31:47 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000003f00008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:47 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000100000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1224.669974] loop1: p1 size 2 extends beyond EOD, truncated [ 1224.682040] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1224.688375] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:47 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000003f000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1224.800546] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1224.857857] Dev loop3: unable to read RDB block 1 [ 1224.862931] loop3: unable to read partition table [ 1224.884768] loop3: partition table beyond EOD, truncated [ 1224.898778] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:47 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000100000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1224.908638] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:47 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000034000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:47 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000300000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:47 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000100000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1225.017977] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1225.083278] loop5: p1 < > p4 [ 1225.095120] loop5: partition table partially beyond EOD, truncated 09:31:47 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000006000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1225.123453] loop5: p1 size 2 extends beyond EOD, truncated [ 1225.138306] Dev loop4: unable to read RDB block 1 [ 1225.147508] loop4: unable to read partition table 09:31:47 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000048000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:47 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x23000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1225.173550] loop1: p1 < > p4 [ 1225.176765] loop1: partition table partially beyond EOD, truncated [ 1225.187226] device bridge_slave_1 left promiscuous mode [ 1225.193514] bridge0: port 2(bridge_slave_1) entered disabled state [ 1225.204879] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1225.210881] loop4: partition table beyond EOD, truncated [ 1225.247249] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1225.256891] loop1: p1 size 2 extends beyond EOD, truncated [ 1225.265941] Dev loop3: unable to read RDB block 1 [ 1225.276597] device bridge_slave_0 left promiscuous mode [ 1225.282936] loop3: unable to read partition table 09:31:47 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1225.301415] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1225.312597] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1225.322516] loop3: partition table beyond EOD, truncated [ 1225.330158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1225.337122] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1225.375991] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1225.387084] net_ratelimit: 23 callbacks suppressed [ 1225.387092] protocol 88fb is buggy, dev hsr_slave_0 09:31:47 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x23000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:47 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000018a6e94c0000055aa", 0x60, 0x1a0}]) [ 1225.417934] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1225.457896] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1225.510394] Dev loop4: unable to read RDB block 1 [ 1225.537500] loop4: unable to read partition table [ 1225.542548] loop4: partition table beyond EOD, truncated [ 1225.547933] Dev loop3: unable to read RDB block 1 [ 1225.553643] loop3: unable to read partition table [ 1225.575777] loop3: partition table beyond EOD, truncated [ 1225.577046] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1225.602931] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1225.627033] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.627406] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.632156] protocol 88fb is buggy, dev hsr_slave_1 [ 1225.637534] protocol 88fb is buggy, dev hsr_slave_1 09:31:48 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000040000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:48 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:48 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x23000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:48 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000028a6e94c0000055aa", 0x60, 0x1a0}]) [ 1225.717584] loop5: p1 < > p4 [ 1225.724641] loop5: partition table partially beyond EOD, truncated [ 1225.742710] loop5: p1 size 2 extends beyond EOD, truncated 09:31:48 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000006800000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1225.797335] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:48 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:48 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000038a6e94c0000055aa", 0x60, 0x1a0}]) [ 1225.857758] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:48 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1225.927624] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:48 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000048a6e94c0000055aa", 0x60, 0x1a0}]) [ 1226.005321] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:48 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000058a6e94c0000055aa", 0x60, 0x1a0}]) [ 1226.113767] loop1: p1 < > p4 [ 1226.118059] Dev loop4: unable to read RDB block 1 [ 1226.124368] loop4: unable to read partition table [ 1226.135646] loop1: partition table partially beyond EOD, truncated [ 1226.145369] loop4: partition table beyond EOD, truncated [ 1226.155450] Dev loop3: unable to read RDB block 1 09:31:48 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1226.169789] loop3: unable to read partition table [ 1226.187053] protocol 88fb is buggy, dev hsr_slave_0 [ 1226.191360] loop1: p1 size 2 extends beyond EOD, truncated [ 1226.192211] protocol 88fb is buggy, dev hsr_slave_1 [ 1226.219876] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1226.229846] loop3: partition table beyond EOD, truncated [ 1226.249296] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1226.266524] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1226.318220] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1226.368005] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1226.436519] loop5: p1 < > p4 [ 1226.443799] loop5: partition table partially beyond EOD, truncated [ 1226.455596] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:48 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000005245000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1226.499686] loop5: p1 size 2 extends beyond EOD, truncated 09:31:48 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000500000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:48 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000068a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:48 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000006c00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1226.543767] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1226.587058] protocol 88fb is buggy, dev hsr_slave_0 [ 1226.587535] protocol 88fb is buggy, dev hsr_slave_0 [ 1226.592240] protocol 88fb is buggy, dev hsr_slave_1 [ 1226.628830] Dev loop4: unable to read RDB block 1 [ 1226.636155] loop4: unable to read partition table [ 1226.656789] loop4: partition table beyond EOD, truncated 09:31:49 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000088a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1226.675919] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1226.687913] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1226.748980] Dev loop3: unable to read RDB block 1 [ 1226.754296] loop3: unable to read partition table [ 1226.777336] loop3: partition table beyond EOD, truncated [ 1226.788231] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1226.808164] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1226.828945] loop1: p1 < > p4 [ 1226.834325] loop1: partition table partially beyond EOD, truncated 09:31:49 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000108a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1226.880932] loop1: p1 size 2 extends beyond EOD, truncated [ 1226.888898] Dev loop4: unable to read RDB block 1 [ 1226.917873] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1226.921787] loop4: unable to read partition table [ 1226.957149] loop4: partition table beyond EOD, truncated [ 1226.986447] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:49 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000011c8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.002773] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1227.017893] Dev loop3: unable to read RDB block 1 [ 1227.022872] loop3: unable to read partition table [ 1227.045640] loop3: partition table beyond EOD, truncated 09:31:49 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000048000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1227.074299] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:49 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.141085] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1227.212163] loop5: p1 < > p4 [ 1227.223821] loop5: partition table partially beyond EOD, truncated 09:31:49 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000600000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:49 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f8a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:49 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000007400000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:49 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.267564] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1227.276343] loop5: p1 size 2 extends beyond EOD, truncated [ 1227.317648] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1227.327747] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1227.384815] Dev loop4: unable to read RDB block 1 [ 1227.398194] loop4: unable to read partition table [ 1227.423666] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1227.427486] loop4: partition table beyond EOD, truncated [ 1227.452521] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:49 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000003408a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.478209] Dev loop3: unable to read RDB block 1 09:31:49 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.498447] loop3: unable to read partition table 09:31:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1227.528130] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1227.539487] loop3: partition table beyond EOD, truncated [ 1227.547211] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:50 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000006b6b6b8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.579026] loop1: p1 < > p4 [ 1227.582683] loop1: partition table partially beyond EOD, truncated [ 1227.613491] loop1: p1 size 2 extends beyond EOD, truncated [ 1227.620411] Dev loop4: unable to read RDB block 1 09:31:50 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1a0f0000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.625423] loop4: unable to read partition table [ 1227.647761] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1227.656276] loop4: partition table beyond EOD, truncated [ 1227.668212] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1227.675269] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1227.758059] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:50 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000007a00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:50 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000004c000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:50 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000700000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:50 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1a0f0000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.923328] loop5: p1 < > p4 [ 1227.927821] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1227.946138] loop5: partition table partially beyond EOD, truncated 09:31:50 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000004808a6e94c0000055aa", 0x60, 0x1a0}]) [ 1227.994594] loop5: p1 size 2 extends beyond EOD, truncated [ 1228.009084] Dev loop3: unable to read RDB block 1 [ 1228.017360] loop3: unable to read partition table [ 1228.026104] loop3: partition table beyond EOD, truncated [ 1228.041231] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1228.056849] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1228.072986] loop1: p1 < > p4 [ 1228.087496] loop1: partition table partially beyond EOD, truncated 09:31:50 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1a0f0000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1228.107665] Dev loop4: unable to read RDB block 1 [ 1228.112718] loop4: unable to read partition table [ 1228.134227] loop4: partition table beyond EOD, truncated [ 1228.136604] loop1: p1 size 2 extends beyond EOD, truncated [ 1228.157666] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1228.160455] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:50 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff68a6e94c0000055aa", 0x60, 0x1a0}]) [ 1228.200377] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1228.217958] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:50 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1228.248241] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:50 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfc8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1228.317908] Dev loop3: unable to read RDB block 1 [ 1228.325420] loop3: unable to read partition table [ 1228.352277] loop3: partition table beyond EOD, truncated [ 1228.361510] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:50 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000004552000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1228.381546] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:50 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000800000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:50 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000048000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:50 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:50 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffe8a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1228.530611] Dev loop4: unable to read RDB block 1 [ 1228.538312] loop4: unable to read partition table [ 1228.559317] loop4: partition table beyond EOD, truncated [ 1228.587233] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1228.605381] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:51 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x7000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:51 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000fcfdffff8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1228.668045] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1228.708744] loop1: p1 < > p4 [ 1228.713088] loop1: partition table partially beyond EOD, truncated 09:31:51 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1228.750280] loop1: p1 size 2 extends beyond EOD, truncated [ 1228.786498] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:51 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000060000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:51 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1228.888142] Dev loop3: unable to read RDB block 1 [ 1228.895460] loop3: unable to read partition table [ 1228.921916] loop3: partition table beyond EOD, truncated 09:31:51 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:51 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1228.947962] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1228.949447] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:51 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000900000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1229.070294] loop5: p1 < > p4 [ 1229.087719] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1229.089624] loop5: partition table partially beyond EOD, truncated [ 1229.148021] Dev loop4: unable to read RDB block 1 [ 1229.154976] loop4: unable to read partition table [ 1229.164271] loop5: p1 size 2 extends beyond EOD, truncated [ 1229.168035] loop4: partition table beyond EOD, truncated [ 1229.188064] Dev loop3: unable to read RDB block 1 [ 1229.195429] loop3: unable to read partition table [ 1229.214713] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1229.215043] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1229.225628] loop3: partition table beyond EOD, truncated [ 1229.242260] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1229.271044] loop1: p1 < > p4 [ 1229.277377] loop1: partition table partially beyond EOD, truncated [ 1229.300700] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1229.301578] loop1: p1 size 2 extends beyond EOD, truncated [ 1229.334178] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1229.345197] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:51 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:51 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000001e200000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:51 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000200008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1229.447506] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:51 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:51 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000068000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:51 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000300008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:52 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000010b00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1229.527775] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:52 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:52 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000400008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1229.665425] Dev loop3: unable to read RDB block 1 [ 1229.672868] loop3: unable to read partition table [ 1229.694908] loop3: partition table beyond EOD, truncated [ 1229.714795] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1229.731916] Dev loop4: unable to read RDB block 1 [ 1229.743707] loop4: unable to read partition table [ 1229.768393] loop4: partition table beyond EOD, truncated [ 1229.779320] loop1: p1 < > p4 [ 1229.787623] loop1: partition table partially beyond EOD, truncated [ 1229.794759] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:31:52 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000500008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1229.814520] loop1: p1 size 2 extends beyond EOD, truncated 09:31:52 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1229.850722] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1229.857955] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1229.898010] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1229.937935] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1229.987773] Dev loop3: unable to read RDB block 1 [ 1229.992694] loop3: unable to read partition table [ 1230.027106] loop3: partition table beyond EOD, truncated [ 1230.039760] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:52 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000f000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:52 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000c00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:52 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000600008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:52 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000006c000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:52 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000800008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1230.247471] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1230.288677] Dev loop4: unable to read RDB block 1 [ 1230.296047] loop4: unable to read partition table [ 1230.330242] loop4: partition table beyond EOD, truncated [ 1230.348677] loop1: p1 < > p4 [ 1230.351820] loop1: partition table partially beyond EOD, truncated [ 1230.353243] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1230.380725] loop1: p1 size 2 extends beyond EOD, truncated [ 1230.407834] Dev loop3: unable to read RDB block 1 [ 1230.412911] loop3: unable to read partition table [ 1230.424211] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1230.437464] loop3: partition table beyond EOD, truncated [ 1230.443564] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:52 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000001000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1230.486319] loop5: p1 < > p4 [ 1230.498131] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1230.514848] loop5: partition table partially beyond EOD, truncated [ 1230.539688] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1230.549456] loop5: p1 size 2 extends beyond EOD, truncated [ 1230.568734] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1230.604097] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1230.617813] Dev loop4: unable to read RDB block 1 [ 1230.622786] loop4: unable to read partition table 09:31:53 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000f00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1230.646537] loop4: partition table beyond EOD, truncated [ 1230.667810] Dev loop3: unable to read RDB block 1 [ 1230.668927] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1230.672834] loop3: unable to read partition table [ 1230.716893] loop3: partition table beyond EOD, truncated [ 1230.733236] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1230.747016] net_ratelimit: 19 callbacks suppressed [ 1230.747025] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.747048] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.752053] protocol 88fb is buggy, dev hsr_slave_1 09:31:53 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000001c01008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1230.757089] protocol 88fb is buggy, dev hsr_slave_1 09:31:53 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000fffe00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:53 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000074000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1230.793070] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1230.827021] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.832182] protocol 88fb is buggy, dev hsr_slave_1 09:31:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:53 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000003008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1230.907973] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:53 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1230.961934] loop1: p1 < > p4 [ 1230.977100] loop1: partition table partially beyond EOD, truncated [ 1230.987678] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1231.002156] loop1: p1 size 2 extends beyond EOD, truncated 09:31:53 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000004003008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1231.049239] Dev loop4: unable to read RDB block 1 [ 1231.054276] loop4: unable to read partition table [ 1231.064813] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1231.080298] loop4: partition table beyond EOD, truncated [ 1231.105213] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1231.137876] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1231.146619] loop5: p1 < > p4 09:31:53 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:53 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000008004008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1231.167601] loop5: partition table partially beyond EOD, truncated [ 1231.178915] loop5: p1 size 2 extends beyond EOD, truncated [ 1231.197745] Dev loop3: unable to read RDB block 1 [ 1231.210216] loop3: unable to read partition table [ 1231.231901] loop3: partition table beyond EOD, truncated [ 1231.239829] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:53 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000001000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1231.272205] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1231.272320] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:53 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1231.322141] Dev loop4: unable to read RDB block 1 [ 1231.334760] loop4: unable to read partition table [ 1231.358996] loop4: partition table beyond EOD, truncated 09:31:53 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000005008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1231.368986] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1231.398089] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1231.423164] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:53 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000fff00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000007a000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 09:31:54 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000006008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1231.567873] loop1: p1 < > p4 [ 1231.571419] loop1: partition table partially beyond EOD, truncated [ 1231.599770] loop1: p1 size 2 extends beyond EOD, truncated [ 1231.607879] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1231.641009] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1231.667833] Dev loop3: unable to read RDB block 1 [ 1231.691399] loop3: unable to read partition table [ 1231.727640] loop3: partition table beyond EOD, truncated [ 1231.743949] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1231.754145] loop5: p1 < > p4 [ 1231.777872] Dev loop4: unable to read RDB block 1 [ 1231.782786] loop4: unable to read partition table [ 1231.801130] loop5: partition table partially beyond EOD, truncated [ 1231.811399] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1231.820519] loop4: partition table beyond EOD, truncated 09:31:54 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000011c008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1231.827051] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1231.835942] loop5: p1 size 2 extends beyond EOD, truncated [ 1231.867052] protocol 88fb is buggy, dev hsr_slave_0 [ 1231.867078] protocol 88fb is buggy, dev hsr_slave_0 09:31:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1231.872224] protocol 88fb is buggy, dev hsr_slave_1 [ 1231.877265] protocol 88fb is buggy, dev hsr_slave_1 [ 1231.894000] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1231.907254] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1231.957890] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1232.008590] Dev loop3: unable to read RDB block 1 [ 1232.016841] loop3: unable to read partition table [ 1232.045480] loop3: partition table beyond EOD, truncated [ 1232.048478] Dev loop4: unable to read RDB block 1 09:31:54 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000001200000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1232.056053] loop4: unable to read partition table [ 1232.085882] loop4: partition table beyond EOD, truncated [ 1232.095636] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1232.111004] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1232.117839] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:54 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000feff00000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:54 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000003f008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:54 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000480000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1232.260737] loop1: p1 < > p4 [ 1232.266109] loop1: partition table partially beyond EOD, truncated [ 1232.297907] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1232.299284] loop1: p1 size 2 extends beyond EOD, truncated 09:31:54 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000340008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1232.333628] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1232.341241] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:54 executing program 2: [ 1232.471992] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:55 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000480008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1232.587648] Dev loop3: unable to read RDB block 1 [ 1232.592619] loop3: unable to read partition table [ 1232.612367] loop3: partition table beyond EOD, truncated 09:31:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRESDEC], 0xfc3c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 09:31:55 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000001400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1232.632736] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1232.649067] loop5: p1 < > p4 [ 1232.657434] loop5: partition table partially beyond EOD, truncated [ 1232.669122] Dev loop4: unable to read RDB block 1 [ 1232.677388] loop4: unable to read partition table [ 1232.688902] loop5: p1 size 2 extends beyond EOD, truncated [ 1232.696394] loop4: partition table beyond EOD, truncated [ 1232.723299] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1232.731239] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:55 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000002008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1232.743688] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1232.757157] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1232.881115] Dev loop3: unable to read RDB block 1 [ 1232.886190] loop3: unable to read partition table [ 1232.903063] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1232.918329] loop3: partition table beyond EOD, truncated [ 1232.939164] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1232.939760] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1233.013266] loop1: p1 < > p4 09:31:55 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000003008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1233.041061] loop1: partition table partially beyond EOD, truncated [ 1233.060195] loop1: p1 size 2 extends beyond EOD, truncated 09:31:55 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000002000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:55 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000001e2000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) [ 1233.107940] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:55 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000004008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1233.178408] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1233.217824] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:55 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000000000f1a00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:55 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000005008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:55 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7fffffff) socket$packet(0x11, 0x0, 0x300) [ 1233.318707] Dev loop4: unable to read RDB block 1 [ 1233.324649] loop4: unable to read partition table [ 1233.350147] loop4: partition table beyond EOD, truncated [ 1233.363861] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1233.395562] loop5: p1 < > p4 [ 1233.414887] loop5: partition table partially beyond EOD, truncated [ 1233.440407] loop5: p1 size 2 extends beyond EOD, truncated [ 1233.458313] Dev loop3: unable to read RDB block 1 [ 1233.464318] loop3: unable to read partition table 09:31:55 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000006008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1233.496820] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1233.508460] loop3: partition table beyond EOD, truncated [ 1233.519844] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1233.540475] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) setrlimit(0x4000000007, &(0x7f0000000200)) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x18, 0x0, 0x0, &(0x7f00000000c0)=""/147, 0x93}}], 0x1, 0x0, 0x0) [ 1233.569517] loop1: p1 < > p4 [ 1233.572852] loop1: partition table partially beyond EOD, truncated [ 1233.600856] loop1: p1 size 2 extends beyond EOD, truncated 09:31:56 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000008008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1233.622745] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1233.648564] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1233.648992] loop1: p4 start 1854537728 is beyond EOD, truncated 09:31:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1233.727437] Dev loop4: unable to read RDB block 1 [ 1233.732475] loop4: unable to read partition table [ 1233.763453] loop4: partition table beyond EOD, truncated 09:31:56 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000004000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:56 executing program 2: pselect6(0x40, &(0x7f0000000480)={0xfffffffffffffffa, 0x6, 0x0, 0x4, 0x10000, 0x8000, 0xffff, 0x2aa}, &(0x7f00000004c0)={0x6b26, 0x9, 0x1, 0x2, 0x6af, 0xb6, 0x200, 0x7}, &(0x7f0000000500)={0x8000, 0xdf4, 0x200, 0x6, 0x2, 0x3889, 0x1000, 0x7fffffff}, &(0x7f0000000540), &(0x7f0000000600)={&(0x7f0000000580)={0x5ee4}, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'nat\x00', 0x7b, "66b8524841d670b602b9be7a2759b02956049e8c009ed62a990afe4947c3dfe895c1d83367e6b2cc79ad64f5186cbf8612088d608db403e845ce7989ed595db11ce74cf45a06e3e73156d7824be9a596ebe1168d56c55b9ff432ca27eb13c83f222098f1b1b8491b45ff572d4bd5e3010b1050838767113b460113"}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ptrace$peekuser(0x3, 0x0, 0x3) syz_open_procfs(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 1233.781589] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1233.792277] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:56 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000000f0000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:56 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000010008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:56 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000001f00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1233.978067] Dev loop3: unable to read RDB block 1 [ 1233.984282] loop3: unable to read partition table [ 1233.997645] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1234.005941] loop3: partition table beyond EOD, truncated [ 1234.027136] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1234.063560] loop5: p1 < > p4 [ 1234.080591] loop5: partition table partially beyond EOD, truncated [ 1234.089374] loop1: p1 < > p4 [ 1234.092692] loop1: partition table partially beyond EOD, truncated 09:31:56 executing program 2: r0 = getpgid(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000740)='net/llc\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r1) sched_setattr(0x0, &(0x7f0000000180)={0x5beb5e0dd6cc70d8, 0x1, 0x0, 0x0, 0x0, 0xff, 0xffffffffffff0b42, 0xfffffffffffffff8}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x4}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC], 0xfc3c) recvmmsg(r2, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 09:31:56 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000001c018a6e94c0000055aa", 0x60, 0x1a0}]) [ 1234.121366] loop5: p1 size 2 extends beyond EOD, truncated [ 1234.122269] loop1: p1 size 2 extends beyond EOD, truncated [ 1234.139303] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1234.189295] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1234.189315] Dev loop4: unable to read RDB block 1 [ 1234.212146] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1234.240606] loop4: unable to read partition table [ 1234.248206] Dev loop3: unable to read RDB block 1 [ 1234.253309] loop3: unable to read partition table [ 1234.268121] loop4: partition table beyond EOD, truncated [ 1234.273771] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1234.287847] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1234.297603] loop3: partition table beyond EOD, truncated [ 1234.326494] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:56 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000038a6e94c0000055aa", 0x60, 0x1a0}]) [ 1234.338157] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:31:56 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000002000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1234.388016] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:56 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000020000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:56 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000040038a6e94c0000055aa", 0x60, 0x1a0}]) [ 1234.518054] Dev loop4: unable to read RDB block 1 [ 1234.523043] loop4: unable to read partition table [ 1234.560419] loop4: partition table beyond EOD, truncated [ 1234.583206] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1234.597951] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1234.639546] loop1: p1 < > p4 [ 1234.651332] loop1: partition table partially beyond EOD, truncated 09:31:57 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000080048a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000fff000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1234.722136] loop1: p1 size 2 extends beyond EOD, truncated [ 1234.776168] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1234.798230] Dev loop3: unable to read RDB block 1 [ 1234.803265] loop3: unable to read partition table 09:31:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1234.835240] loop3: partition table beyond EOD, truncated [ 1234.841697] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:57 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000058a6e94c0000055aa", 0x60, 0x1a0}]) [ 1234.894548] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1234.918635] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:57 executing program 2: r0 = getpgid(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000740)='net/llc\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r1) sched_setattr(0x0, &(0x7f0000000180)={0x5beb5e0dd6cc70d8, 0x1, 0x0, 0x0, 0x0, 0xff, 0xffffffffffff0b42, 0xfffffffffffffff8}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x4}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC], 0xfc3c) recvmmsg(r2, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) [ 1234.997728] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:57 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000002300000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:57 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000006b6b6b000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1235.077869] Dev loop4: unable to read RDB block 1 [ 1235.083341] loop4: unable to read partition table [ 1235.097205] loop4: partition table beyond EOD, truncated 09:31:57 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000068a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1235.146410] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1235.241795] loop1: p1 < > p4 [ 1235.250408] loop1: partition table partially beyond EOD, truncated [ 1235.297809] Dev loop3: unable to read RDB block 1 [ 1235.302934] loop3: unable to read partition table [ 1235.313402] loop1: p1 size 2 extends beyond EOD, truncated [ 1235.330969] loop3: partition table beyond EOD, truncated [ 1235.338063] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:57 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000011c8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1235.352163] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1235.363712] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1235.458059] Dev loop4: unable to read RDB block 1 [ 1235.463192] loop4: unable to read partition table [ 1235.484895] loop4: partition table beyond EOD, truncated 09:31:57 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f8a6e94c0000055aa", 0x60, 0x1a0}]) [ 1235.512247] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1235.528009] loop5: p1 < > p4 [ 1235.536181] loop5: partition table partially beyond EOD, truncated [ 1235.546081] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1235.565847] loop5: p1 size 2 extends beyond EOD, truncated [ 1235.578164] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1235.596860] loop5: p4 start 1854537728 is beyond EOD, truncated 09:31:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000200000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1235.668358] Dev loop3: unable to read RDB block 1 [ 1235.673395] loop3: unable to read partition table 09:31:58 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000003408a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:58 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000003f00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1235.709730] loop3: partition table beyond EOD, truncated [ 1235.710782] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1235.747485] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1235.751245] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:58 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:31:58 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000004808a6e94c0000055aa", 0x60, 0x1a0}]) [ 1235.907991] Dev loop4: unable to read RDB block 1 [ 1235.913016] loop4: unable to read partition table [ 1235.957944] loop4: partition table beyond EOD, truncated [ 1235.963772] loop1: p1 < > p4 [ 1235.969845] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1235.977745] loop1: partition table partially beyond EOD, truncated [ 1236.000566] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:58 executing program 2: r0 = getpgid(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000740)='net/llc\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r1) sched_setattr(0x0, &(0x7f0000000180)={0x5beb5e0dd6cc70d8, 0x1, 0x0, 0x0, 0x0, 0xff, 0xffffffffffff0b42, 0xfffffffffffffff8}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x4}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC], 0xfc3c) recvmmsg(r2, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 09:31:58 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000fffff0000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1236.023162] loop1: p1 size 2 extends beyond EOD, truncated [ 1236.027025] net_ratelimit: 18 callbacks suppressed [ 1236.027032] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.029517] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.033915] protocol 88fb is buggy, dev hsr_slave_1 [ 1236.049378] protocol 88fb is buggy, dev hsr_slave_1 09:31:58 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000028a6e94c0000055aa", 0x60, 0x1a0}]) [ 1236.095773] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1236.109813] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1236.168589] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1236.254718] loop5: p1 < > p4 09:31:58 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000038a6e94c0000055aa", 0x60, 0x1a0}]) [ 1236.276574] loop5: partition table partially beyond EOD, truncated [ 1236.294933] Dev loop3: unable to read RDB block 1 [ 1236.300058] loop3: unable to read partition table 09:31:58 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000004000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000006b6b6b0000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1236.322462] loop5: p1 size 2 extends beyond EOD, truncated [ 1236.337157] loop3: partition table beyond EOD, truncated [ 1236.374100] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1236.380944] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:58 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000048a6e94c0000055aa", 0x60, 0x1a0}]) [ 1236.461011] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1236.498017] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1236.558038] Dev loop4: unable to read RDB block 1 09:31:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1236.578839] loop4: unable to read partition table [ 1236.587045] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.592176] protocol 88fb is buggy, dev hsr_slave_1 [ 1236.640086] loop4: partition table beyond EOD, truncated [ 1236.651886] loop1: p1 < > p4 [ 1236.669831] loop1: partition table partially beyond EOD, truncated [ 1236.678056] Dev loop3: unable to read RDB block 1 09:31:59 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000058a6e94c0000055aa", 0x60, 0x1a0}]) [ 1236.685678] loop3: unable to read partition table [ 1236.699302] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1236.711338] loop3: partition table beyond EOD, truncated [ 1236.727829] loop1: p1 size 2 extends beyond EOD, truncated [ 1236.749116] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1236.785774] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1236.818627] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:31:59 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000010000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:59 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000068a6e94c0000055aa", 0x60, 0x1a0}]) [ 1236.962659] loop5: p1 < > p4 [ 1236.978617] loop5: partition table partially beyond EOD, truncated [ 1236.987033] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.987072] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.992121] protocol 88fb is buggy, dev hsr_slave_1 [ 1236.997175] protocol 88fb is buggy, dev hsr_slave_1 09:31:59 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000fffff00000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:31:59 executing program 2: r0 = getpgid(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000740)='net/llc\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r1) sched_setattr(0x0, &(0x7f0000000180)={0x5beb5e0dd6cc70d8, 0x1, 0x0, 0x0, 0x0, 0xff, 0xffffffffffff0b42, 0xfffffffffffffff8}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x4}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC], 0xfc3c) recvmmsg(r2, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) [ 1237.025666] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1237.055419] loop5: p1 size 2 extends beyond EOD, truncated [ 1237.062923] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:59 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000be5a94100000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:59 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000088a6e94c0000055aa", 0x60, 0x1a0}]) [ 1237.137893] Dev loop4: unable to read RDB block 1 [ 1237.145254] loop4: unable to read partition table [ 1237.166598] loop5: p4 start 1854537728 is beyond EOD, [ 1237.174144] truncated [ 1237.198694] Dev loop3: unable to read RDB block 1 [ 1237.206054] loop4: partition table beyond EOD, truncated [ 1237.218687] loop3: unable to read partition table [ 1237.240715] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1237.251303] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1237.255597] loop3: partition table beyond EOD, truncated [ 1237.276560] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:31:59 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000108a6e94c0000055aa", 0x60, 0x1a0}]) 09:31:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1237.300080] loop1: p1 < > p4 [ 1237.312140] loop1: partition table partially beyond EOD, truncated [ 1237.365306] loop1: p1 size 2 extends beyond EOD, truncated [ 1237.373493] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1237.390689] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1237.427708] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:31:59 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0020055aa", 0x60, 0x1a0}]) [ 1237.498026] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:31:59 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000100000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1237.577940] Dev loop3: unable to read RDB block 1 [ 1237.585837] loop3: unable to read partition table [ 1237.611520] loop3: partition table beyond EOD, truncated [ 1237.640996] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:32:00 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0030055aa", 0x60, 0x1a0}]) 09:32:00 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000004200000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1237.698388] Dev loop4: unable to read RDB block 1 [ 1237.708066] loop4: unable to read partition table [ 1237.738957] loop4: partition table beyond EOD, truncated [ 1237.768092] loop5: p1 < > p4 [ 1237.771537] loop5: partition table partially beyond EOD, truncated [ 1237.787194] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:32:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000020000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:00 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0040055aa", 0x60, 0x1a0}]) [ 1237.844129] loop5: p1 size 2 extends beyond EOD, truncated [ 1237.864078] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1237.874971] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1237.917764] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1237.962502] loop1: p1 < > p4 [ 1237.965775] loop1: partition table partially beyond EOD, truncated [ 1237.994935] loop1: p1 size 2 extends beyond EOD, truncated 09:32:00 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0050055aa", 0x60, 0x1a0}]) [ 1238.022465] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1238.038913] loop1: p4 start 1854537728 is beyond EOD, truncated 09:32:00 executing program 2: write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000500)) 09:32:00 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000200000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1238.138305] Dev loop3: unable to read RDB block 1 [ 1238.150263] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1238.161392] loop3: unable to read partition table 09:32:00 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0060055aa", 0x60, 0x1a0}]) [ 1238.185549] loop3: partition table beyond EOD, truncated [ 1238.202426] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:32:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r1) clone(0x200102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 09:32:00 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000004800000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1238.277686] Dev loop4: unable to read RDB block 1 [ 1238.282602] loop4: unable to read partition table 09:32:00 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0080055aa", 0x60, 0x1a0}]) [ 1238.323786] loop4: partition table beyond EOD, truncated [ 1238.347265] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1238.363181] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1238.449147] loop5: p1 < > p4 [ 1238.457899] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1238.463110] loop5: partition table partially beyond EOD, truncated 09:32:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000030000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:01 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0100055aa", 0x60, 0x1a0}]) [ 1238.515485] loop5: p1 size 2 extends beyond EOD, truncated [ 1238.538716] loop1: p1 < > p4 [ 1238.541971] loop1: partition table partially beyond EOD, truncated [ 1238.555435] loop5: p4 start 1854537728 is beyond EOD, truncated 09:32:01 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000300000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1238.577307] loop1: p1 size 2 extends beyond EOD, truncated [ 1238.592934] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1238.631162] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:32:01 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c01c0155aa", 0x60, 0x1a0}]) [ 1238.697702] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:32:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1238.737977] Dev loop3: unable to read RDB block 1 [ 1238.747078] loop3: unable to read partition table [ 1238.752666] loop3: partition table beyond EOD, truncated [ 1238.773480] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1238.781283] Dev loop4: unable to read RDB block 1 09:32:01 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000004c00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1238.786269] loop4: unable to read partition table [ 1238.811789] loop4: partition table beyond EOD, truncated [ 1238.837725] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1238.858159] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:32:01 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000355aa", 0x60, 0x1a0}]) 09:32:01 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0400355aa", 0x60, 0x1a0}]) 09:32:01 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000040000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1238.958001] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1239.029273] loop1: p1 < > p4 [ 1239.032551] loop1: partition table partially beyond EOD, truncated [ 1239.048832] loop1: p1 size 2 extends beyond EOD, truncated [ 1239.088345] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1239.111074] loop5: p1 < > p4 [ 1239.120362] loop5: partition table partially beyond EOD, truncated [ 1239.145420] loop5: p1 size 2 extends beyond EOD, truncated [ 1239.178394] Dev loop3: unable to read RDB block 1 [ 1239.183427] loop3: unable to read partition table [ 1239.196782] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1239.211342] loop3: partition table beyond EOD, truncated [ 1239.217684] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1239.237129] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1239.281712] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1239.338654] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1239.397828] Dev loop3: unable to read RDB block 1 [ 1239.403986] loop3: unable to read partition table [ 1239.427134] loop3: partition table beyond EOD, truncated [ 1239.432725] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1239.567901] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1241.147034] net_ratelimit: 19 callbacks suppressed [ 1241.147043] protocol 88fb is buggy, dev hsr_slave_0 [ 1241.147068] protocol 88fb is buggy, dev hsr_slave_0 [ 1241.152049] protocol 88fb is buggy, dev hsr_slave_1 [ 1241.157088] protocol 88fb is buggy, dev hsr_slave_1 [ 1241.227031] protocol 88fb is buggy, dev hsr_slave_0 [ 1241.232149] protocol 88fb is buggy, dev hsr_slave_1 [ 1241.729924] device hsr_slave_1 left promiscuous mode [ 1241.772390] device hsr_slave_0 left promiscuous mode [ 1241.853821] team0 (unregistering): Port device team_slave_1 removed [ 1241.870316] team0 (unregistering): Port device team_slave_0 removed [ 1241.883563] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1241.952366] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1242.141657] bond0 (unregistering): Released all slaves 09:32:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="1b0000004a001f0fff07f4f9002304000a04f51108000100020100", 0x1b) 09:32:04 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:04 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0800455aa", 0x60, 0x1a0}]) 09:32:04 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000005400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:04 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000050000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1242.267041] protocol 88fb is buggy, dev hsr_slave_0 [ 1242.267070] protocol 88fb is buggy, dev hsr_slave_1 [ 1242.272227] protocol 88fb is buggy, dev hsr_slave_1 09:32:04 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000555aa", 0x60, 0x1a0}]) 09:32:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) clone(0x100802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2000000003, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffe75) [ 1242.460861] loop1: p1 < > p4 [ 1242.473631] loop1: partition table partially beyond EOD, truncated [ 1242.487814] Dev loop3: unable to read RDB block 1 [ 1242.492780] loop3: unable to read partition table [ 1242.509792] loop1: p1 size 2 extends beyond EOD, truncated [ 1242.527617] loop3: partition table beyond EOD, truncated [ 1242.540542] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1242.551238] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1242.569285] Dev loop4: unable to read RDB block 1 [ 1242.574425] loop4: unable to read partition table 09:32:05 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000655aa", 0x60, 0x1a0}]) [ 1242.612975] loop4: partition table beyond EOD, truncated [ 1242.643421] loop5: p1 < > p4 [ 1242.651633] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1242.663967] loop5: partition table partially beyond EOD, truncated [ 1242.671773] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1242.689955] loop5: p1 size 2 extends beyond EOD, truncated [ 1242.735825] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1242.742691] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1242.797796] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1242.827035] protocol 88fb is buggy, dev hsr_slave_0 09:32:05 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0011c55aa", 0x60, 0x1a0}]) 09:32:05 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000060000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1242.845765] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:32:05 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000005500000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1242.910549] Dev loop4: unable to read RDB block 1 [ 1242.921888] loop4: unable to read partition table [ 1242.947878] loop4: partition table beyond EOD, truncated 09:32:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1242.974928] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1243.044206] loop1: p1 < > p4 [ 1243.067828] loop1: partition table partially beyond EOD, truncated [ 1243.087379] loop1: p1 size 2 extends beyond EOD, truncated 09:32:05 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000500000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1243.113633] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1243.121558] Dev loop3: unable to read RDB block 1 [ 1243.131789] loop3: unable to read partition table 09:32:05 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0003f55aa", 0x60, 0x1a0}]) [ 1243.165466] loop3: partition table beyond EOD, truncated [ 1243.196845] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1243.205573] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1243.248886] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1243.314794] loop5: p1 < > p4 [ 1243.325336] loop5: partition table partially beyond EOD, truncated [ 1243.335677] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1243.351870] loop5: p1 size 2 extends beyond EOD, truncated 09:32:05 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000006000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:05 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0034055aa", 0x60, 0x1a0}]) [ 1243.413292] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1243.427117] Dev loop4: unable to read RDB block 1 [ 1243.432022] loop4: unable to read partition table [ 1243.468259] Dev loop3: unable to read RDB block 1 [ 1243.474146] loop4: partition table beyond EOD, truncated [ 1243.479047] loop3: unable to read partition table [ 1243.489131] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1243.505988] loop3: partition table beyond EOD, truncated [ 1243.521284] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1243.536282] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:32:06 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) [ 1243.577595] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 09:32:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:06 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0048055aa", 0x60, 0x1a0}]) [ 1243.618603] loop1: p1 < > p4 [ 1243.621757] loop1: partition table partially beyond EOD, truncated 09:32:06 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000026060000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1243.679382] loop1: p1 size 2 extends beyond EOD, truncated [ 1243.698012] Dev loop4: unable to read RDB block 1 [ 1243.709876] loop4: unable to read partition table [ 1243.725419] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1243.738104] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1243.745724] loop4: partition table beyond EOD, truncated 09:32:06 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000255aa", 0x60, 0x1a0}]) 09:32:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'ip_vti0\x00\x1e\x00', 0x800201e}) dup3(r2, r3, 0x0) [ 1243.776551] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1243.868031] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:32:06 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000600000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:06 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000006300000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:06 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000355aa", 0x60, 0x1a0}]) [ 1244.005472] loop5: p1 < > p4 [ 1244.017772] Dev loop3: unable to read RDB block 1 [ 1244.022788] loop3: unable to read partition table 09:32:06 executing program 2: [ 1244.048907] loop5: partition table partially beyond EOD, truncated [ 1244.057342] loop3: partition table beyond EOD, truncated [ 1244.069621] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1244.090539] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1244.090920] loop5: p1 size 2 extends beyond EOD, truncated 09:32:06 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000455aa", 0x60, 0x1a0}]) [ 1244.133910] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1244.157887] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:32:06 executing program 2: [ 1244.209946] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:32:06 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000070000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1244.282212] loop1: p1 < > p4 [ 1244.285605] loop1: partition table partially beyond EOD, truncated [ 1244.317742] Dev loop4: unable to read RDB block 1 [ 1244.322865] loop4: unable to read partition table 09:32:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:06 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000555aa", 0x60, 0x1a0}]) 09:32:06 executing program 2: [ 1244.344856] loop4: partition table beyond EOD, truncated [ 1244.351040] loop1: p1 size 2 extends beyond EOD, truncated [ 1244.369959] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1244.381253] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 09:32:06 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000655aa", 0x60, 0x1a0}]) 09:32:06 executing program 2: [ 1244.437973] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1244.478093] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1244.538013] Dev loop3: unable to read RDB block 1 [ 1244.544202] loop3: unable to read partition table [ 1244.569213] loop3: partition table beyond EOD, truncated [ 1244.587752] Dev loop4: unable to read RDB block 1 [ 1244.592661] loop4: unable to read partition table [ 1244.603986] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1244.627626] loop4: partition table beyond EOD, truncated [ 1244.657393] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1244.688199] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:32:07 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000700000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:07 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000006800000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:07 executing program 2: 09:32:07 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000855aa", 0x60, 0x1a0}]) 09:32:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1244.798021] Dev loop3: unable to read RDB block 1 [ 1244.803020] loop3: unable to read partition table [ 1244.826217] loop3: partition table beyond EOD, truncated [ 1244.838149] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1244.848169] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1244.934663] loop1: p1 < > p4 [ 1244.947167] loop1: partition table partially beyond EOD, truncated [ 1244.964867] loop1: p1 size 2 extends beyond EOD, truncated 09:32:07 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000090000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:07 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0001055aa", 0x60, 0x1a0}]) [ 1244.990518] loop1: p4 start 1854537728 is beyond EOD, truncated 09:32:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:07 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0xfdef, 0x1a0}]) [ 1245.109064] loop5: p1 < > p4 [ 1245.125870] loop5: partition table partially beyond EOD, truncated [ 1245.134443] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1245.168942] loop5: p1 size 2 extends beyond EOD, truncated [ 1245.188119] Dev loop4: unable to read RDB block 1 [ 1245.193323] loop4: unable to read partition table [ 1245.217542] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1245.224285] loop4: partition table beyond EOD, truncated [ 1245.241395] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1245.249978] loop5: p4 start 1854537728 is beyond EOD, truncated 09:32:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:07 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000006c00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1245.328567] Dev loop3: unable to read RDB block 1 [ 1245.344061] loop3: unable to read partition table [ 1245.357151] loop3: partition table beyond EOD, truncated [ 1245.372158] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1245.381667] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1245.430401] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:32:07 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x20010060, 0x1a0}]) 09:32:07 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6b6b6b, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:07 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000041a9e50b00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1245.478256] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 09:32:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1245.560118] loop1: p1 < > p4 [ 1245.563392] loop1: partition table partially beyond EOD, truncated 09:32:08 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000041a9e50b0000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1245.607343] loop1: p1 size 2 extends beyond EOD, truncated [ 1245.635388] loop1: p4 start 1854537728 is beyond EOD, truncated 09:32:08 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6b6b6b, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1245.674932] Dev loop4: unable to read RDB block 1 [ 1245.684837] loop4: unable to read partition table [ 1245.708900] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1245.730892] loop4: partition table beyond EOD, truncated 09:32:08 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000007400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1245.772190] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1245.777908] Dev loop3: unable to read RDB block 1 [ 1245.784488] loop3: unable to read partition table [ 1245.800280] loop3: partition table beyond EOD, truncated 09:32:08 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6b6b6b, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1245.828482] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1245.888048] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1245.928036] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1245.987328] loop5: p1 < > p4 [ 1245.999844] loop5: partition table partially beyond EOD, truncated [ 1246.025074] loop5: p1 size 2 extends beyond EOD, truncated 09:32:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0x0, 0x2, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1246.050599] loop1: p1 < > p4 [ 1246.054047] loop1: partition table partially beyond EOD, truncated 09:32:08 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000000000c0000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:08 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000c00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1246.095859] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1246.118814] loop1: p1 size 2 extends beyond EOD, truncated [ 1246.144454] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1246.232181] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1246.270497] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 09:32:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0x0, 0x2, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1246.327904] Dev loop3: unable to read RDB block 1 [ 1246.337787] loop3: unable to read partition table [ 1246.363559] loop3: partition table beyond EOD, truncated [ 1246.397574] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1246.407891] Dev loop4: unable to read RDB block 1 [ 1246.426452] loop4: unable to read partition table [ 1246.431591] net_ratelimit: 19 callbacks suppressed [ 1246.431599] protocol 88fb is buggy, dev hsr_slave_0 [ 1246.431654] protocol 88fb is buggy, dev hsr_slave_1 [ 1246.437044] protocol 88fb is buggy, dev hsr_slave_0 [ 1246.451851] protocol 88fb is buggy, dev hsr_slave_1 [ 1246.458856] loop4: partition table beyond EOD, truncated 09:32:08 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0xfffffdef, 0x1a0}]) 09:32:08 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000007a00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1246.488285] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1246.517653] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1246.560109] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1246.648754] Dev loop3: unable to read RDB block 1 [ 1246.653796] loop3: unable to read partition table [ 1246.679563] loop3: partition table beyond EOD, truncated 09:32:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0x0, 0x2, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1246.707394] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:32:09 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000260d00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1246.750441] loop1: p1 < > p4 [ 1246.786821] loop5: p1 < > p4 [ 1246.790771] loop1: partition table partially beyond EOD, truncated [ 1246.807432] loop1: p1 size 2 extends beyond EOD, truncated [ 1246.813441] loop5: partition table partially beyond EOD, truncated [ 1246.832721] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1246.843118] loop5: p1 size 2 extends beyond EOD, truncated 09:32:09 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000100000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1246.902133] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1246.910966] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 09:32:09 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:09 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068ffffffffffffff7f00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1246.957595] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1246.987026] protocol 88fb is buggy, dev hsr_slave_0 [ 1246.992193] protocol 88fb is buggy, dev hsr_slave_1 [ 1247.046125] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1247.067844] Dev loop4: unable to read RDB block 1 [ 1247.072897] loop4: unable to read partition table [ 1247.092656] loop4: partition table beyond EOD, truncated [ 1247.129801] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1247.169236] Dev loop3: unable to read RDB block 1 [ 1247.174406] loop3: unable to read partition table 09:32:09 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1247.202828] loop3: partition table beyond EOD, truncated [ 1247.248942] loop1: p1 < > p4 [ 1247.254698] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1247.268422] loop1: partition table partially beyond EOD, truncated [ 1247.279410] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1247.304941] loop1: p1 size 2 extends beyond EOD, truncated 09:32:09 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1247.349905] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1247.371137] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1247.387850] protocol 88fb is buggy, dev hsr_slave_0 [ 1247.393459] protocol 88fb is buggy, dev hsr_slave_1 [ 1247.397806] protocol 88fb is buggy, dev hsr_slave_0 [ 1247.403917] protocol 88fb is buggy, dev hsr_slave_1 [ 1247.421141] [ 1247.422810] ====================================================== [ 1247.429128] WARNING: possible circular locking dependency detected [ 1247.435451] 5.0.0-rc8+ #1 Not tainted [ 1247.439253] ------------------------------------------------------ [ 1247.445571] syz-executor.0/2070 is trying to acquire lock: [ 1247.451192] 0000000000da93ab (&mm->mmap_sem){++++}, at: __do_page_fault+0x9c2/0xd60 [ 1247.459146] [ 1247.459146] but task is already holding lock: [ 1247.465123] 000000004a2ecd0f (&sb->s_type->i_mutex_key#12){+.+.}, at: generic_file_write_iter+0xdf/0x610 [ 1247.474851] [ 1247.474851] which lock already depends on the new lock. [ 1247.474851] [ 1247.483163] [ 1247.483163] the existing dependency chain (in reverse order) is: [ 1247.490783] [ 1247.490783] -> #2 (&sb->s_type->i_mutex_key#12){+.+.}: [ 1247.497606] down_write+0x38/0x90 [ 1247.501648] shmem_fallocate+0x15a/0xc60 [ 1247.506342] ashmem_shrink_scan+0x1d7/0x4f0 [ 1247.511222] ashmem_ioctl+0x2f0/0x11a0 [ 1247.515687] do_vfs_ioctl+0xd6e/0x1390 [ 1247.520093] ksys_ioctl+0xab/0xd0 [ 1247.524065] __x64_sys_ioctl+0x73/0xb0 [ 1247.528491] do_syscall_64+0x103/0x610 [ 1247.532904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.538605] [ 1247.538605] -> #1 (ashmem_mutex){+.+.}: [ 1247.544068] __mutex_lock+0xf7/0x1310 [ 1247.548395] mutex_lock_nested+0x16/0x20 [ 1247.552976] ashmem_mmap+0x55/0x520 [ 1247.557198] mmap_region+0xc37/0x1760 [ 1247.561528] do_mmap+0x8e2/0x1080 [ 1247.565501] vm_mmap_pgoff+0x1c5/0x230 [ 1247.569906] ksys_mmap_pgoff+0x4aa/0x630 [ 1247.574506] __x64_sys_mmap+0xe9/0x1b0 [ 1247.578914] do_syscall_64+0x103/0x610 [ 1247.583323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.589026] [ 1247.589026] -> #0 (&mm->mmap_sem){++++}: [ 1247.594623] lock_acquire+0x16f/0x3f0 [ 1247.599084] down_read+0x3b/0x90 [ 1247.602972] __do_page_fault+0x9c2/0xd60 [ 1247.607552] do_page_fault+0x71/0x581 [ 1247.611868] page_fault+0x1e/0x30 [ 1247.615912] iov_iter_fault_in_readable+0x1ba/0x450 [ 1247.621455] generic_perform_write+0x195/0x530 [ 1247.626558] __generic_file_write_iter+0x25e/0x630 [ 1247.632010] generic_file_write_iter+0x360/0x610 [ 1247.637335] __vfs_write+0x613/0x8e0 [ 1247.641579] vfs_write+0x20c/0x580 [ 1247.645636] ksys_pwrite64+0x183/0x1c0 [ 1247.650040] __x64_sys_pwrite64+0x97/0xf0 [ 1247.654707] do_syscall_64+0x103/0x610 [ 1247.659115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.664812] [ 1247.664812] other info that might help us debug this: [ 1247.664812] [ 1247.672940] Chain exists of: [ 1247.672940] &mm->mmap_sem --> ashmem_mutex --> &sb->s_type->i_mutex_key#12 [ 1247.672940] [ 1247.684479] Possible unsafe locking scenario: [ 1247.684479] [ 1247.690527] CPU0 CPU1 [ 1247.695183] ---- ---- [ 1247.699841] lock(&sb->s_type->i_mutex_key#12); [ 1247.704594] lock(ashmem_mutex); [ 1247.710555] lock(&sb->s_type->i_mutex_key#12); [ 1247.717821] lock(&mm->mmap_sem); [ 1247.721360] [ 1247.721360] *** DEADLOCK *** [ 1247.721360] [ 1247.727450] 2 locks held by syz-executor.0/2070: [ 1247.732199] #0: 00000000820f3117 (sb_writers#6){.+.+}, at: vfs_write+0x429/0x580 [ 1247.739848] #1: 000000004a2ecd0f (&sb->s_type->i_mutex_key#12){+.+.}, at: generic_file_write_iter+0xdf/0x610 [ 1247.749924] [ 1247.749924] stack backtrace: [ 1247.754428] CPU: 1 PID: 2070 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #1 [ 1247.761522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.771042] Call Trace: [ 1247.773646] dump_stack+0x172/0x1f0 [ 1247.777278] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1247.782646] __lock_acquire+0x2f00/0x4700 [ 1247.786799] ? mark_held_locks+0x100/0x100 [ 1247.791037] ? mark_held_locks+0x100/0x100 [ 1247.795274] ? __lock_is_held+0xb6/0x140 [ 1247.799336] lock_acquire+0x16f/0x3f0 [ 1247.803146] ? __do_page_fault+0x9c2/0xd60 [ 1247.807390] down_read+0x3b/0x90 [ 1247.810760] ? __do_page_fault+0x9c2/0xd60 [ 1247.814999] __do_page_fault+0x9c2/0xd60 [ 1247.819065] do_page_fault+0x71/0x581 [ 1247.822869] page_fault+0x1e/0x30 [ 1247.826324] RIP: 0010:iov_iter_fault_in_readable+0x1ba/0x450 [ 1247.832125] Code: 4c 39 f3 76 17 eb 3b e8 34 2d 47 fe 48 81 c3 00 10 00 00 48 39 9d 68 ff ff ff 72 2d e8 1f 2d 47 fe 0f 1f 00 0f ae e8 45 31 f6 <8a> 13 0f 1f 00 31 ff 44 89 f6 41 88 57 d0 e8 83 2e 47 fe 45 85 f6 [ 1247.851028] RSP: 0018:ffff8880548b79b8 EFLAGS: 00010246 [ 1247.856393] RAX: 0000000000040000 RBX: 0000000020600000 RCX: ffffc90005e5f000 [ 1247.863664] RDX: 0000000000040000 RSI: ffffffff8328b201 RDI: 0000000000000005 [ 1247.870935] RBP: ffff8880548b7a58 R08: ffff8880597b6380 R09: fffff9400039063f [ 1247.878212] R10: fffff9400039063e R11: ffffea0001c831f7 R12: 0000000000001000 [ 1247.885481] R13: 0000000000001000 R14: 0000000000000000 R15: ffff8880548b7a30 [ 1247.892766] ? iov_iter_fault_in_readable+0x1b1/0x450 [ 1247.898406] ? iov_iter_fault_in_readable+0x1b1/0x450 [ 1247.903596] ? copy_page_from_iter+0x750/0x750 [ 1247.908185] generic_perform_write+0x195/0x530 [ 1247.912778] ? page_endio+0x780/0x780 [ 1247.916584] ? current_time+0x140/0x140 [ 1247.920561] ? lock_acquire+0x16f/0x3f0 [ 1247.924541] __generic_file_write_iter+0x25e/0x630 [ 1247.929529] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1247.934551] generic_file_write_iter+0x360/0x610 [ 1247.939313] ? __generic_file_write_iter+0x630/0x630 [ 1247.944421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1247.949960] ? iov_iter_init+0xea/0x220 [ 1247.953935] __vfs_write+0x613/0x8e0 [ 1247.957650] ? kernel_read+0x120/0x120 [ 1247.961597] ? rcu_read_lock_sched_held+0x110/0x130 [ 1247.966615] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1247.971376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.976915] ? __sb_start_write+0x1ac/0x360 [ 1247.981237] vfs_write+0x20c/0x580 [ 1247.984777] ksys_pwrite64+0x183/0x1c0 [ 1247.988667] ? __ia32_sys_pread64+0xf0/0xf0 [ 1247.992992] ? ksys_pwrite64+0x10/0x1c0 [ 1247.996966] __x64_sys_pwrite64+0x97/0xf0 [ 1248.001115] do_syscall_64+0x103/0x610 [ 1248.005006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.010219] RIP: 0033:0x411f77 [ 1248.013418] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1248.032325] RSP: 002b:00007f81eccfba10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1248.040044] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000411f77 [ 1248.047313] RDX: 0000000008100000 RSI: 0000000020010000 RDI: 0000000000000004 [ 1248.054586] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000 [ 1248.061855] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f81eccfc6d4 [ 1248.069121] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000000000000 [ 1248.082810] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1248.092888] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' 09:32:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000700)='.dead\x00', 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x0, {{0xffffffff80000000, 0x2, 0x2, r4}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYRES32=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r3], @ANYRESOCT, @ANYRES64=r4, @ANYRESDEC=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES64=r2], @ANYRESDEC=r1]) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000340)=""/74) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r6, 0x0, 0xfd54) r7 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r7, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) syz_open_dev$cec(0x0, 0x2, 0x2) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') [ 1248.103656] Dev loop4: unable to read RDB block 1 [ 1248.112007] loop4: unable to read partition table [ 1248.127971] loop4: partition table beyond EOD, truncated [ 1248.140107] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1248.150173] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1248.154512] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1248.167411] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1248.174061] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1248.220416] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1248.230842] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1248.240915] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1248.249208] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' 09:32:10 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0xfffffffffffffdef, 0x1a0}]) 09:32:10 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000001000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:10 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:10 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000008000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:10 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000120000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1248.299848] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1248.311253] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1248.323135] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1248.330011] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1248.351969] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1248.363067] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1248.370238] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1248.377106] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1248.380302] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1248.386515] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' 09:32:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1248.392631] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1248.470606] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1248.488537] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1248.490628] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1248.509177] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' 09:32:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) [ 1248.523824] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1248.560630] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1248.579256] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1248.617836] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1248.624713] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1248.640271] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1248.649951] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1248.667066] kobject: 'loop5' (0000000079bae245): kobject_uevent_env 09:32:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1248.680424] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' 09:32:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:11 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x8800000}]) [ 1248.749872] Dev loop3: unable to read RDB block 1 [ 1248.757766] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1248.760880] loop3: unable to read partition table [ 1248.773658] loop3: partition table beyond EOD, truncated [ 1248.781724] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' 09:32:11 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x7fffffffffffffff}]) [ 1248.797777] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:32:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1248.857401] kobject: 'holders' (000000002012b62b): kobject_cleanup, parent 000000000e5a8609 [ 1248.869801] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1248.872827] kobject: 'holders' (000000002012b62b): auto cleanup kobject_del [ 1248.877075] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1248.897780] Dev loop4: unable to read RDB block 1 09:32:11 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r0, 0x0, 0x4, &(0x7f0000000340)='hfs\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x401}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)=ANY=[@ANYRES32=r3, @ANYBLOB="5d000000c7c8998927bc9373ed62cc1019eb42aac7adb99b3796055a12bb31c7fbe14660a2732f8ae43fb3b872c4469e1b9f9b7797d854782cf2e61dbf264baca69a2e88d33e53f392caa9199808d1667d76d1337ad7f9f7d97d0d1ceaa69d12d1feb4fe819f07328339fcaa15d700020000000000005e59a40fe5150c4a59ef07423a4e68d0ae607ee7"], &(0x7f0000000240)=0x65) 09:32:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) r6 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r6, 0x810c5701, &(0x7f0000000180)) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1248.904987] loop4: unable to read partition table [ 1248.918337] kobject: 'holders' (000000002012b62b): calling ktype release [ 1248.919381] loop4: partition table beyond EOD, truncated [ 1248.937248] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1248.945336] kobject: (000000002012b62b): dynamic_kobj_release [ 1248.945978] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1248.967238] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1248.974644] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1248.996705] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1249.003075] kobject: 'holders': free name [ 1249.008156] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1249.014731] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1249.020159] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1249.038384] kobject: 'loop1p1' (000000000e5a8609): kobject_uevent_env [ 1249.045325] kobject: 'loop1p1' (000000000e5a8609): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1249.066477] loop1: p1 < > p4 [ 1249.070316] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1249.070528] loop1: partition table partially beyond EOD, truncated [ 1249.082069] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1249.084196] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1249.102122] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1249.114151] loop1: p1 size 2 extends beyond EOD, truncated [ 1249.123465] kobject: 'loop1p1' (0000000096656449): kobject_add_internal: parent: 'loop1', set: 'devices' [ 1249.125523] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1249.140309] kobject: 'loop1p1' (0000000096656449): kobject_uevent_env [ 1249.142442] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1249.147519] kobject: 'loop1p1' (0000000096656449): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1249.155056] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1249.164169] kobject: 'loop1p1' (000000000e5a8609): kobject_cleanup, parent (null) [ 1249.182757] kobject: 'holders' (000000007a777a59): kobject_add_internal: parent: 'loop1p1', set: '' [ 1249.189389] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1249.193370] kobject: 'loop1p1' (000000000e5a8609): calling ktype release [ 1249.206094] kobject: 'loop1p1': free name [ 1249.210952] kobject: 'loop1p1' (0000000096656449): kobject_uevent_env [ 1249.214745] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1249.218398] kobject: 'loop1p1' (0000000096656449): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1249.239461] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1249.257436] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1249.265369] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1249.267126] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1249.274596] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1249.282325] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1249.297851] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1249.299105] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1249.316434] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1249.329902] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1249.336335] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1249.346421] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1249.352892] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1249.367732] kobject: 'holders' (00000000470c0716): kobject_cleanup, parent 0000000026f47ab6 [ 1249.379548] kobject: 'holders' (00000000470c0716): auto cleanup kobject_del [ 1249.387881] kobject: 'holders' (00000000470c0716): calling ktype release [ 1249.395169] kobject: (00000000470c0716): dynamic_kobj_release [ 1249.403726] kobject: 'holders': free name [ 1249.411957] kobject: 'loop5p1' (0000000026f47ab6): kobject_uevent_env 09:32:11 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000048000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:32:11 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r0 = add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = geteuid() getresgid(&(0x7f0000000000), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) keyctl$chown(0x4, r0, r1, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:11 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000001200000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:11 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000140000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1249.427330] kobject: 'loop5p1' (0000000026f47ab6): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1' [ 1249.459892] loop5: p1 < > p4 [ 1249.463167] loop5: partition table partially beyond EOD, truncated 09:32:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1249.485982] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1249.495363] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1249.497105] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1249.506735] loop5: p1 size 2 extends beyond EOD, truncated [ 1249.517539] kobject: 'loop5p1' (0000000026f47ab6): kobject_cleanup, parent (null) [ 1249.531389] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1249.534589] kobject: 'loop5p1' (0000000026f47ab6): calling ktype release [ 1249.556046] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1249.562078] kobject: 'loop5p1' (000000009b851e7a): kobject_add_internal: parent: 'loop5', set: 'devices' [ 1249.569858] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1249.578848] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1249.583813] kobject: 'loop5p1': free name [ 1249.594984] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1249.602859] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1249.620110] kobject: 'loop5p1' (000000009b851e7a): kobject_uevent_env [ 1249.631048] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1249.637992] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1249.643246] kobject: 'loop5p1' (000000009b851e7a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1249.644504] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1249.666851] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1249.683022] kobject: 'holders' (00000000c3a0cd28): kobject_add_internal: parent: 'loop5p1', set: '' [ 1249.708436] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1249.727187] kobject: 'loop5p1' (000000009b851e7a): kobject_uevent_env [ 1249.727423] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1249.750528] kobject: 'loop5p1' (000000009b851e7a): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1' [ 1249.791933] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1249.807703] Dev loop3: unable to read RDB block 1 [ 1249.812839] loop3: unable to read partition table [ 1249.822290] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1249.829031] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1249.835595] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1249.847838] loop3: partition table beyond EOD, truncated [ 1249.853508] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1249.864861] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:32:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r1 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) syz_open_procfs(0x0, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:32:12 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x3ee01507e9db0679}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000000c0)={0x0, @loopback, 0x4e21, 0x4, 'fo\x00', 0x2, 0xbe52, 0x19}, 0x2c) [ 1249.919152] Dev loop4: unable to read RDB block 1 [ 1249.924165] loop4: unable to read partition table [ 1249.935829] loop4: partition table beyond EOD, truncated [ 1249.950041] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1249.998691] kobject: 'holders' (000000007a777a59): kobject_cleanup, parent 0000000096656449 [ 1250.019870] kobject: 'holders' (000000007a777a59): auto cleanup kobject_del 09:32:12 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2f, 'pids'}, {0x0, 'cpu'}]}, 0xb) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1250.050259] kobject: 'holders' (000000007a777a59): calling ktype release [ 1250.059377] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1250.066064] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1250.087775] kobject: (000000007a777a59): dynamic_kobj_release 09:32:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r5, 0x0, 0xfd54) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1250.101093] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1250.115373] kobject: 'holders': free name [ 1250.128136] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1250.134993] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1250.135437] kobject: 'loop1p1' (0000000096656449): kobject_uevent_env [ 1250.154546] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1250.162054] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1250.171151] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1250.181546] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1250.187191] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1250.192376] kobject: 'loop1p1' (0000000096656449): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' 09:32:12 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$sock_bt_hci(r0, 0x400448ee, &(0x7f0000000180)="3278873c070651030df30fcc49431c0843f5e4093360b1529e34e3354d1dbc7c04c21c9487aebfc9d6ade6bb7ec60f18fa461acb7adee58e9cecb83ce796aa0fe3725ebab8cd1266838c02550b11d594ce4311225aaf62d71053dcf15378d0debd6a37f27d96f02cea2de1ed36441467464c05c387c835ea9969012acb9c54f74755ec5845668656567f73e512d0cbca3134f7a4c9393eb98f9a73e5c67f55a78544997cb1bb09a3b872be8462c1e47a7d2864d1c16c9f174624645b40bf5d3d9f6a3243") add_key(0x0, 0x0, &(0x7f00000000c0)="d08ae64a26c4f15a4dbdadef490e65a29abb24d1a87f73babbea7aed817f000000000000008f851c3733b348e65ab52653", 0x31, r1) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1250.200151] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1250.205108] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1250.227287] loop1: p1 < > p4 [ 1250.230500] loop1: partition table partially beyond EOD, truncated [ 1250.236930] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1250.253930] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1250.265292] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1250.274594] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1250.286771] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1250.300195] kobject: 'loop1p1' (0000000096656449): kobject_cleanup, parent (null) [ 1250.311580] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1250.318097] kobject: 'loop1p1' (0000000096656449): calling ktype release [ 1250.325162] loop1: p1 size 2 extends beyond EOD, truncated [ 1250.333768] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1250.343631] kobject: 'loop1p1': free name [ 1250.351961] kobject: 'loop1p1' (000000000f01d0b0): kobject_add_internal: parent: 'loop1', set: 'devices' [ 1250.365001] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1250.376809] kobject: 'loop1p1' (000000000f01d0b0): kobject_uevent_env [ 1250.384450] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1250.396709] kobject: 'loop1p1' (000000000f01d0b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1250.416745] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1250.417618] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1250.431127] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1250.442181] kobject: 'holders' (00000000fba0b32f): kobject_add_internal: parent: 'loop1p1', set: '' [ 1250.469342] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1250.479245] kobject: 'loop1p1' (000000000f01d0b0): kobject_uevent_env [ 1250.497019] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1250.509582] kobject: 'loop1p1' (000000000f01d0b0): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1250.529303] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1250.551990] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1250.555023] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1250.568695] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1250.579759] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1250.586373] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1250.598745] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1250.605243] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1250.620377] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1250.626857] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' 09:32:13 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000001400000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:32:13 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000ffffff8100000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:13 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000000f1a0000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:13 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPIN\x00', &(0x7f00000000c0)='\x00', 0x1, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000100)={0x0, 0x80000001}, 0x2) [ 1250.677233] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1250.689940] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' 09:32:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1250.770175] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1250.779120] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1250.804385] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1250.817439] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1250.823903] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1250.834009] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1250.840306] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1250.844112] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1250.848531] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1250.913999] kobject: 'holders' (00000000c3a0cd28): kobject_cleanup, parent 000000009b851e7a [ 1250.925640] kobject: 'holders' (00000000c3a0cd28): auto cleanup kobject_del [ 1250.933738] kobject: 'holders' (00000000c3a0cd28): calling ktype release [ 1250.946751] kobject: (00000000c3a0cd28): dynamic_kobj_release [ 1250.954275] Dev loop3: unable to read RDB block 1 [ 1250.961724] loop3: unable to read partition table [ 1250.966893] kobject: 'holders': free name [ 1250.971821] loop3: partition table beyond EOD, truncated [ 1250.983211] kobject: 'loop5p1' (000000009b851e7a): kobject_uevent_env [ 1250.990317] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1251.001701] Dev loop4: unable to read RDB block 1 [ 1251.008040] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1251.014651] loop4: unable to read partition table [ 1251.022770] kobject: 'loop5p1' (000000009b851e7a): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1' [ 1251.033757] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1251.046653] loop4: partition table beyond EOD, truncated [ 1251.054331] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1251.070965] loop5: p1 < > p4 [ 1251.074322] loop5: partition table partially beyond EOD, truncated [ 1251.085544] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1251.093125] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1251.107048] kobject: 'holders' (00000000fba0b32f): kobject_cleanup, parent 000000000f01d0b0 [ 1251.107617] loop5: p1 size 2 extends beyond EOD, truncated [ 1251.125037] kobject: 'loop5p1' (000000008b3fde09): kobject_add_internal: parent: 'loop5', set: 'devices' [ 1251.127008] kobject: 'holders' (00000000fba0b32f): auto cleanup kobject_del [ 1251.142011] kobject: 'loop5p1' (000000008b3fde09): kobject_uevent_env [ 1251.151805] kobject: 'loop5p1' (000000009b851e7a): kobject_cleanup, parent (null) [ 1251.157040] kobject: 'holders' (00000000fba0b32f): calling ktype release [ 1251.160551] kobject: 'loop5p1' (000000008b3fde09): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1251.181296] kobject: 'loop5p1' (000000009b851e7a): calling ktype release [ 1251.187009] kobject: (00000000fba0b32f): dynamic_kobj_release [ 1251.188546] kobject: 'loop5p1': free name [ 1251.194091] kobject: 'holders': free name [ 1251.201487] kobject: 'holders' (000000006fe8504f): kobject_add_internal: parent: 'loop5p1', set: '' [ 1251.207573] kobject: 'loop1p1' (000000000f01d0b0): kobject_uevent_env [ 1251.215108] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1251.225526] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1251.237025] kobject: 'loop1p1' (000000000f01d0b0): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1251.239669] kobject: 'loop5p1' (000000008b3fde09): kobject_uevent_env [ 1251.254493] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1251.263596] kobject: 'loop5p1' (000000008b3fde09): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1' [ 1251.267244] loop1: p1 < > p4 [ 1251.274508] loop5: p4 start 1854537728 is beyond EOD, truncated [ 1251.277431] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1251.288313] loop1: partition table partially beyond EOD, truncated [ 1251.289703] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1251.296170] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1251.306058] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1251.316830] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1251.318749] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1251.338102] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.344538] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1251.357001] kobject: 'loop1p1' (000000000f01d0b0): kobject_cleanup, parent (null) [ 1251.357429] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1251.368813] kobject: 'loop1p1' (000000000f01d0b0): calling ktype release [ 1251.378879] loop1: p1 size 2 extends beyond EOD, truncated [ 1251.379108] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.385341] kobject: 'loop1p1' (00000000df5c7caa): kobject_add_internal: parent: 'loop1', set: 'devices' [ 1251.391125] kobject: 'loop1p1': free name [ 1251.391826] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' 09:32:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r1 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:13 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x400000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000340)=""/74) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1251.423042] kobject: 'loop1p1' (00000000df5c7caa): kobject_uevent_env [ 1251.430482] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1251.439142] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1251.454913] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.467106] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' 09:32:13 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000000001f0000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:32:13 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0xfffffffffffffffc) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffcec, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f00000000c0)=""/92) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1251.476666] kobject: 'loop1p1' (00000000df5c7caa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1251.493799] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.500619] kobject: 'holders' (000000003ebcb948): kobject_add_internal: parent: 'loop1p1', set: '' [ 1251.510600] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' 09:32:13 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000000000000f1a00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r3, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r1]) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1251.521838] kobject: 'loop1p1' (00000000df5c7caa): kobject_uevent_env [ 1251.547013] net_ratelimit: 20 callbacks suppressed [ 1251.547020] protocol 88fb is buggy, dev hsr_slave_0 [ 1251.547061] protocol 88fb is buggy, dev hsr_slave_1 [ 1251.552002] protocol 88fb is buggy, dev hsr_slave_1 [ 1251.559993] kobject: 'loop1p1' (00000000df5c7caa): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1251.588317] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1251.620045] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1251.626508] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1251.656023] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1251.657416] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1251.668890] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1251.678740] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1251.685162] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1251.694739] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.701223] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1251.711528] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.719670] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1251.747439] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1251.753971] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1251.779579] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.782795] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1251.797020] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1251.805139] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1251.813120] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1251.827594] Dev loop4: unable to read RDB block 1 [ 1251.832616] loop4: unable to read partition table [ 1251.838035] loop4: partition table beyond EOD, truncated 09:32:14 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000018200000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:14 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r1, 0x401) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2000000008001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) r1 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r2 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r3}}}, 0x28) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:32:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r1 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1251.843733] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1251.852527] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1251.868381] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1251.898843] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1251.906778] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1251.925571] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1251.932766] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1251.943604] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.951003] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1251.962226] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1251.971917] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1251.979424] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1251.997877] Dev loop3: unable to read RDB block 1 [ 1251.998839] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1252.003028] loop3: unable to read partition table [ 1252.009206] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1252.024731] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1252.031626] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1252.042546] loop3: partition table beyond EOD, truncated [ 1252.042624] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1252.048534] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1252.055999] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' 09:32:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r1 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:14 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x800000000004, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) r1 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x1, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1252.090128] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1252.097672] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1252.149628] kobject: 'holders' (000000003ebcb948): kobject_cleanup, parent 00000000df5c7caa [ 1252.175336] kobject: 'holders' (000000003ebcb948): auto cleanup kobject_del [ 1252.186482] kobject: 'holders' (000000003ebcb948): calling ktype release [ 1252.193507] protocol 88fb is buggy, dev hsr_slave_0 [ 1252.193554] protocol 88fb is buggy, dev hsr_slave_1 [ 1252.207125] kobject: (000000003ebcb948): dynamic_kobj_release [ 1252.213119] kobject: 'holders': free name [ 1252.219409] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1252.225941] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1252.238980] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1252.251371] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1252.252012] kobject: 'loop1p1' (00000000df5c7caa): kobject_uevent_env [ 1252.258286] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1252.265952] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1252.275361] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1252.284044] kobject: 'loop1p1' (00000000df5c7caa): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1252.288132] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1252.299975] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1252.308652] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1252.326628] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1252.330414] loop1: p1 < > p4 [ 1252.336767] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1252.342009] loop1: partition table partially beyond EOD, truncated 09:32:14 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:14 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000001f00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:14 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000200000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) 09:32:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1252.345870] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1252.352494] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1252.375125] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1252.385944] kobject: 'loop5' (0000000079bae245): kobject_uevent_env 09:32:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1252.410982] loop1: p1 size 2 extends beyond EOD, truncated [ 1252.417149] kobject: 'loop1p1' (00000000df5c7caa): kobject_cleanup, parent (null) [ 1252.432784] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1252.443493] kobject: 'loop1p1' (00000000df5c7caa): calling ktype release [ 1252.453830] kobject: 'loop1p1' (000000004ca91b27): kobject_add_internal: parent: 'loop1', set: 'devices' [ 1252.464042] kobject: 'loop1p1': free name [ 1252.480482] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1252.487341] kobject: 'loop1p1' (000000004ca91b27): kobject_uevent_env [ 1252.494193] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1252.497286] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1252.516790] kobject: 'loop1p1' (000000004ca91b27): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1252.529747] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1252.539859] kobject: 'holders' (000000000648ed69): kobject_add_internal: parent: 'loop1p1', set: '' [ 1252.552542] kobject: 'loop1p1' (000000004ca91b27): kobject_uevent_env [ 1252.559753] kobject: 'loop1p1' (000000004ca91b27): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1252.567600] Dev loop4: unable to read RDB block 1 [ 1252.573608] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1252.575402] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1252.590879] loop4: unable to read partition table [ 1252.595909] loop4: partition table beyond EOD, truncated [ 1252.601692] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1252.611495] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1252.620921] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1252.628276] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1252.659897] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1252.666611] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1252.667005] protocol 88fb is buggy, dev hsr_slave_0 [ 1252.676576] protocol 88fb is buggy, dev hsr_slave_0 [ 1252.681209] protocol 88fb is buggy, dev hsr_slave_1 [ 1252.686455] protocol 88fb is buggy, dev hsr_slave_1 [ 1252.697805] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1252.704733] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1252.711342] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1252.747598] Dev loop3: unable to read RDB block 1 [ 1252.752492] loop3: unable to read partition table [ 1252.757528] loop3: partition table beyond EOD, truncated [ 1252.762994] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 09:32:15 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000ffffff8200000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:15 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f00000000c0)) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x108, 0x4, 0x0, 0x7, 0xffffffff, @broadcast}, 0x10) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:15 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r1 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r0, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r0]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:15 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505331, &(0x7f0000000600)={{0xbf}}) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1252.817527] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1252.826425] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1252.844579] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1252.860341] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1252.871222] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1252.882854] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1252.892929] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1252.903200] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1252.910071] kobject: 'loop1' (0000000037766546): kobject_uevent_env 09:32:15 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000000c0)=""/140) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1252.916626] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1252.916873] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1252.926649] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1252.944954] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' 09:32:15 executing program 2: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:32:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000002000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1252.971748] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' 09:32:15 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:15 executing program 2: add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:32:15 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000230000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1253.017336] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1253.024069] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' 09:32:15 executing program 2: add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1253.077483] kobject: 'holders' (000000000648ed69): kobject_cleanup, parent 000000004ca91b27 [ 1253.087080] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1253.093828] kobject: 'holders' (000000000648ed69): auto cleanup kobject_del [ 1253.101113] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1253.111349] kobject: 'holders' (000000000648ed69): calling ktype release [ 1253.118260] kobject: 'loop5' (0000000079bae245): kobject_uevent_env 09:32:15 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)=0xdf) syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 1253.126769] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1253.132039] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1253.133527] kobject: (000000000648ed69): dynamic_kobj_release [ 1253.153766] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1253.167685] kobject: 'holders': free name [ 1253.175757] kobject: 'loop1p1' (000000004ca91b27): kobject_uevent_env [ 1253.197512] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1253.207402] kobject: 'loop1p1' (000000004ca91b27): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1253.214824] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1253.227017] protocol 88fb is buggy, dev hsr_slave_0 [ 1253.227532] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1253.241947] loop1: p1 < > p4 [ 1253.241992] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1253.245158] loop1: partition table partially beyond EOD, truncated [ 1253.255518] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1253.270906] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1253.284395] kobject: 'loop5' (0000000079bae245): kobject_uevent_env [ 1253.286113] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1253.290941] kobject: 'loop1p1' (000000004ca91b27): kobject_cleanup, parent (null) [ 1253.290949] kobject: 'loop1p1' (000000004ca91b27): calling ktype release [ 1253.290981] kobject: 'loop1p1': free name [ 1253.291067] kobject: 'loop5' (0000000079bae245): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1253.300508] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1253.342320] Dev loop4: unable to read RDB block 1 [ 1253.347617] loop4: unable to read partition table [ 1253.352604] loop4: partition table beyond EOD, truncated [ 1253.360722] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 1253.369917] loop1: p1 size 2 extends beyond EOD, truncated [ 1253.376544] kobject: 'loop1p1' (00000000bea9a691): kobject_add_internal: parent: 'loop1', set: 'devices' [ 1253.391225] Dev loop3: unable to read RDB block 1 [ 1253.396121] loop3: unable to read partition table [ 1253.401847] loop3: partition table beyond EOD, truncated [ 1253.413746] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1253.421851] kobject: 'loop1p1' (00000000bea9a691): kobject_uevent_env [ 1253.430664] kobject: 'loop1p1' (00000000bea9a691): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1253.444026] kobject: 'holders' (0000000055408eb1): kobject_add_internal: parent: 'loop1p1', set: '' [ 1253.456415] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1253.463649] kobject: 'loop1p1' (00000000bea9a691): kobject_uevent_env [ 1253.472717] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1253.483289] kobject: 'loop1p1' (00000000bea9a691): fill_kobj_path: path = '/devices/virtual/block/loop1/loop1p1' [ 1253.496486] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1253.504712] loop1: p4 start 1854537728 is beyond EOD, truncated [ 1253.513639] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1253.520274] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1253.547104] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1253.553764] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1253.566831] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1253.576408] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1253.582871] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1253.598340] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1253.607778] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1253.630012] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1253.647221] kobject: 'loop3' (0000000032130b75): kobject_uevent_env [ 1253.655375] kobject: 'loop3' (0000000032130b75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1253.665257] kobject: 'loop1' (0000000037766546): kobject_uevent_env [ 1253.671749] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1253.681529] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1253.687993] kobject: 'loop4' (00000000050bd556): fill_kobj_path: path = '/devices/virtual/block/loop4' 09:32:16 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="00006800000000ffffff8c00000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:16 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x2300) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r1 = add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) write$FUSE_LK(r0, &(0x7f00000007c0)={0x28, 0x0, 0x1, {{0xffffffff80000000, 0x0, 0x2, r2}}}, 0x28) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32], @ANYRES64=r2, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r0]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000340)=""/74) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r4, 0x0, 0xfd54) r5 = syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000180)) semget$private(0x0, 0x1, 0x400) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2) add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000600)={0x1, 0xff, 0x2d}) 09:32:16 executing program 2: add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) 09:32:16 executing program 0: syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000a40)=""/4096, 0x1000) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 09:32:16 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000002800000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) [ 1253.739985] Dev loop3: unable to read RDB block 1 [ 1253.752472] loop3: unable to read partition table [ 1253.778539] kobject: 'loop1' (0000000037766546): kobject_uevent_env 09:32:16 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000100)={0xc0000000, 0x7, "3f08054fd639436bc72eba8490481023c8f5dfd968150d595fa4d99658f5bd20", 0x4, 0x10001, 0x4, 0x8, 0x80000000, 0x9, 0x1000, 0x2, [0x7, 0x69cf250e, 0x0, 0x7fffffff]}) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9) syz_mount_image$hfs(&(0x7f0000000680)='hfs\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0x0, 0x8001f, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) 09:32:16 executing program 2: add_key$user(0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) [ 1253.789058] loop3: partition table beyond EOD, truncated [ 1253.797825] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 1253.804007] kobject: 'loop1' (0000000037766546): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1253.814924] kobject: 'loop4' (00000000050bd556): kobject_uevent_env [ 1253.825087] kobject: 'loop3' (0000000032130b75): kobject_uevent_env 09:32:16 executing program 2: add_key$user(&(0x7f00000003c0)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 09:32:16 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) add_key(0x0,